The silent security leak!

Feb. 12, 2010

As technology changes and we expect more from devices in our print and copier rooms, it probably comes as no shock that those devices like copiers, scanners and fax machines are basically computers in a different form factor. What most of us don’t think about is what happens to all those reproductions and information that hits the hard drive on the system.

As a security professional we have to look at this a definite risk in the form of raw information such as PII, confidential information etc… and build policy around the purchasing, repairs (who what why when) and disposal of the units (hard drives) at end of their life cycle.

 A very good article on the subject >>

 

Sponsored Recommendations

Trend Micro commits to U.S. cyber protection by joining Hacking Policy Council

Trend brings formidable experience in this space through its Zero Day Initiative (ZDI), a vendor-agnostic bug bounty program, and a leading voice in ethical disclosure practices...

Keeper Security shares most important files to preserve when disaster strikes

By protecting these documents and storing them in a safe place, such as a digital vault, you'll be much more prepared when disaster strikes.

Former National Cyber Director Chris Inglis joins Semperis’ Strategic Advisory Board

Inglis’ appointment follows announcements from Semperis of aggressive expansion into the public sector and other strategic advisory board appointments, such as the addition of...

NordVPN survey: Americans scored 64% in the National Privacy Test

Results show that the world's online privacy and cybersecurity awareness is declining every year.