Source |
CSO |
Identifiant |
6226212 |
Date de publication |
2022-08-10 02:00:00 (vue: 2022-08-10 09:05:35) |
Titre |
8 tips to secure printers on your network |
Texte |
I recently introduced a Ricoh IM 6500 printer on the office network, and it reminded me that we need to treat printers like computers. These devices should be given the same amount of security resources, controls, processes and isolation as need for any other computer in your network.Focus on these eight areas to keep you printers from being a point of entry for attackers:1. Limit access privileges to printers
Like any other technology, limit printer access to only those who need it. Define the network IP addresses of the devices with permission to access each printer.2. Disable unused protocols
Disable unused protocols that are active on each device. Only set up those protocols that are needed. Ensure that you review this process regularly as the needs for your network changes.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
6500 access active addresses amount any are areas article attackers:1 being changes click computer computers controls define device devices disable each eight ensure entry focus from full given here introduced isolation keep like limit need needed needs network office only other permission please point printer printers privileges process processes protocols read recently regularly reminded resources review ricoh same secure security set should technology these those tips treat unused who your |
Tags |
|
Stories |
|
Notes |
|
Move |
|