PrintIT Reseller issue 119

PRINTITRESELLER.UK 43 VOX POP continued... Security for all business technology – whether in the office or elsewhere – is imperative as more devices become networked and potential entry points for cyber-attacks increase As for the practical measures that businesses should consider when it comes to protecting their printers: It goes without saying that print devices should all come with encrypted harddisks and firmware. The latter should always comply with the latest security standards. Interestingly enough, the greatest threat to IT security typically comes from insiders, i.e. a company’s own workforce. Secure access functions, such as Lexmark Print Release, ensure only authenticated and authorised users are allowed to work with sensitive information. Network protection should be implemented through encryption and security functions, separating different inputs and outputs (such as fax and networked printing). Simple and secure remote device management via Lexmark’s Markvision Enterprise and Lexmark Cloud Fleet Management solutions, for example, allow for remote security and device configuration for an entire fleet. Mark Williams: We want our clients to work smarter but safer through better use of technology. There are two prongs to this: thinking about how technology can improve our clients’ business, growth and overall profitability, but also ensuring that within those parameters they’re working safely. Security for all business technology – whether in the office or elsewhere – is imperative as more devices become networked and potential entry points for cyber-attacks increase. This has been an ongoing focus for Sharp and as such, we encourage our clients to adopt a holistic approach to security and leverage end-user training to help put the theory into practice. As a managed services provider, we can help take the burden away by advising on what needs to be done. Khalid Aziz: When it comes to successfully integrating new technology, businesses must take a security-first approach. In fact, the first step to any digital transformation journey is to ensure that your assets are protected, and any new processes comply with security policies. This is where Canon’s SaaS security offering, uniFLOW Online has become a key driver of growth, helping businesses to embrace cloud printing, and regain control of their document management in an agile and secure environment. Protected by zero trust architecture and third-party authorisation, uniFLOW Online customers can embark on their digital transformation journey, with a strong foundation of cyber hygiene, that they can continue to maintain as their business grows. Neil Macdonald, Channel Director UK&I, HP Inc: To significantly reduce the threat faced and become more proactive, organisations should implement isolation technology alongside protection and visibility tools. There are two key approaches for implementing and running isolation containers: cloud and on-device. With an on-device approach the container runs locally on the user’s device and leverages the power of hardwarebased virtualisation to isolate the container away from your Windows OS and internal network. Using hardware-based isolation containers, businesses can leverage isolation technology to create a virtual safety net for end-users to protect them when they click on high-risk content. This could be an email attachment, file downloaded from the Internet, a file opened on a USB drive, or website link a user has clicked on. If the content turns out to be malicious, the malware is isolated inside a container and cannot harm the user’s PC or your internal network. Solutions, such as HP Sure Click, provide the threat containment needed to protect devices from malicious code. Traditional antivirus software relies on recognising suspicious patterns and already-identified malware. While this tried-and-tested technique provides a solid first line of defence, it doesn’t safeguard your computer from novel or evolving attacks. With cybercriminals crafting new malicious code daily, HP Sure Click is essential for protecting your PC. Khalid Aziz

RkJQdWJsaXNoZXIy NDUxNDM=