Print.IT Reseller - issue 62
VOX POP PRINT IT RESELLER.UK 45 continued... Jonathan Whitworth: “The increase in hacks has focused customers on the need for data security vigilance. Whilst PewDiePie sought publicity to expand their fan levels and indeed gained high exposure in the mainstream media, hacking has changed from opportunists making mischief to organised crime gangs seeking to extort large sums, so print security is becoming higher on customers’ IT priorities.” Martin Randall: “Of course hacks aren’t the preferred way of increasing awareness, but without a doubt actual incidents like this, especially when so well highlighted in the media, attract more attention which naturally leads to increased priority.” Mark Bamford: “I wouldn’t describe PewDiePie as a hack. If you leave your front door open and someone walks through it, you wouldn’t describe it as breaking in. Similarly, if you leave network printers open to the internet without passwords on, you are just making them available for people to print on… which is what happened. Are boardroom executives worried about the very small possibility that someone might do some unauthorised printing as a stunt? No, they are not.” Nigel Allen: “The individual who was responsible for the PewDiePie hack claims it took him just 30 minutes to create the script that attacked 50,000 printers. The attack could have been malicious, but all that he did was to print out a message. The perpetrator claims that he did it to highlight the open network port vulnerability on hundreds of thousands of printers worldwide. “While PewDiePie received a lot of publicity, and some customers got the message, I don’t believe that any single attack will ensure printer security gains traction in the boardroom. “Securing network printers should be seen as a key part of an organisation’s overall cyber security strategy. Prevention is the key word. Companies still need to be more serious about security when specifying and installing a device. According to IBM, the global average cost of a data breach last year was $3.86 million. By investing more money up front, businesses can mitigate the huge Lee Dzendrowski, Director of Technical Architecture, Commercial Managed IT : “This depends on the sector. Looking at larger organisations, they are taking security more seriously and considering what devices they introduce into their network. They are a bit more cautious about adding devices such as printers. “We see many smaller clients introducing devices such as printers or personal devices, without taking security into consideration. The danger is that once a hijacker has access to the printer, they can access other devices and services within the network. “When clients are considering the introduction of new devices or services within their network, we really highlight the risks. For example, we recommend ring-fencing a printer from critical services and make sure that sensitive data is encrypted.” Andrew Quy, Solutions Consultant, Xeretec : “With the advent of the GDPR mandate, companies of all sizes across all sectors are acutely aware of the dangers of unsecured endpoints. There’s now a great appreciation of the fact that any device that’s connected to the network – like a printer – needs to be secured. “Of course, device security isn’t the be all and end all. It’s imperative that companies also consider how documents flow in, around and out of their organisation to prevent data leaks or information falling into the wrong hands. “Device security and document security are interlinked and must be considered in the context of each other if the dangers of a print or document- related security breach are to be diminished.” reputational, operational and regulatory costs of a cyberattack.” Martyn Williams: “The hack made it clear to organisations to understand their print security vulnerabilities and work with partners that help them with their security print strategies.” Lee Dzendrowski: “This hack was about trying to get access to other data via the printer and, as a result, a lot of people have reviewed their printer security policy. It raised eyebrows about security and what it means for organisations. Some are turning a blind eye as they believe their network is secure, whereas there’s still a lot of work to do to additionally secure devices. “It’s often the case that until a potential security breach occurs, nothing is being done. We carry out tailored infrastructure assessments to identify and highlight the risks before they become detrimental to organisations. We have expertise in print and in IT under one roof, so we are able to implement extra practices and strategies to ensure our clients are secure.” Andrew Quy: “The PewDiePie attack was certainly a wake-up call for anyone who doubted how vulnerable an unprotected print device could be. In light of the attack, it would be naïve for anyone to now underestimate the value of having a secure print device. “To that end, for years, Xeretec has been working with its customers to carry out regular security assessments which enables us to identify potential risks for our customers. We’re keen to ensure that keeping device security front- of-mind becomes best practice among our clients, rather than it only becoming a talking point after a successful hack attack.” Some are turning a blind eye as they believe their network is secure, whereas there’s still a lot of work to do to additionally secure devices PrintIT Reseller: To what extent do you think the PewDiePie hack highlighted the risks and has it brought print security higher up the boardroom agenda? Nigel Allen Andrew Quy
Made with FlippingBook
RkJQdWJsaXNoZXIy NDUxNDM=