Showing posts with label Computer Printers copier. Show all posts
Showing posts with label Computer Printers copier. Show all posts

Sunday, February 2, 2020

Printer Security is Not Worth Worrying About - Right?


When looking at enterprise security, we commonly refer to and consider firewalls, Intrusion Prevention Systems (IPS), Virtual Private Networks (VPN), encryption and authentication.  When we think of securing our data, we think of securing critical servers and databases.  Rarely do we think of printers. Billions of dollars are spent worldwide on security each year, but how much did your organization spend on securing their printers this last 12 months?  If you answered zero, you would be in the vast majority.



Printers have come a long way since their widespread adoption in the late 1970's and early 1980's.  Back in the day, each printer was connected to an individual system and could only process a single print job at a time.  Today, printers have matured into multi-functional devices that bare little resemblance to their distant origins.  Printers in the 21st century perform dozens of tasks including, but not limited to, printing, scanning, photocopying, faxing and even emailing documents.  What most users, and even system, network and security administrators do not realize is what really goes on inside a printer and what functionality they truly have.  Most users still think of the printers of 30 years ago; unintelligent devices that only possess the ability to print documents.  This view is far removed from the truth.

When discussing printers in this article, we are not only talking about the behemoths you see in most large enterprises, but also your low-end multi-functional printers you now find common in regular households.  Rare is it to find a printer, no matter how small, that only performs the single task of printing.  Most, at a very minimum, provide faxing or scanning and with these come increased memory requirements.  Scanning a full document in preparation to print, scanning a document to be saved as a PDF or similar file, or scanning a document to allow faxing all require the ability to buffer the data within the device.  A buffer is basically a region of memory that allows the storing of temporary data.  Printers use this buffer to store a digital version of the document you are printing, scanning or faxing.  Depending on the device, this buffer can range from a small piece of Random Access Memory (RAM) to a Hard Disk Drive like the type found in your desktop or laptop computer.  In larger enterprise printers, this buffer is not the only memory store found within the printer.  A larger, non-volatile memory area is provided to store semi-permanent or permanent information.  For example, some printers allow scanning of a document and saving it within the printer as a PDF.  The user may then connect to the printer as if it were a network drive, or via a web page, and download their document.

So where are we going with all this? The leakage or theft of sensitive and confidential corporate information.  Large enterprises may have developed and implemented data retention and destruction policies but rarely do these include, or even mention, printers.  Companies look at hard copies of documents, CD's, DVD's and workstation, laptop and server hard drives when developing their data destruction policies.  While it is clear they identify hard drives as a source of sensitive information, rarely do they consider the hard drives contained within their printers, if they even know of their existence. Printers are also commonly overlooked when security policies, procedures and guidelines are developed and implemented.  Little time, if any, is spent looking at printer security or the implications of not securing the corporate printers.  

All the more disturbing this becomes when you contemplate the common types of documents that pass through printers in a corporate environment.  Depending on the industry or the department within the organization, documents can vary from sensitive financial records, personal customer data or detailed network diagrams, to name a few.

To understand how sensitive data is leaked via a simple printer to the outside world, it requires an understanding of the corporate environment, security controls within that environment, and the general flow of information between users, printers and file systems that house restricted data.
In the ideal, secure corporate environment, a user has restricted access to files that pertain to his or her job function.  The files reside on a secure server within the corporate network and are protected by strong access control policies requiring a user to authenticate before being allowed access to files. In our example, a user requires a sensitive financial document for a meeting he is about to attend.  The user authenticates to the server, access to the file is authorized by the access control policies set on the file and the user opens the file in Microsoft Word.  

He clicks on the print icon and sends the document as a print job to his nearest printer.  With this simple act, we have taken a secure document that very limited users have access to, and have created two copies that are no longer protected by any form of access control.  The first is the obvious; the paper copy our user requires for their meeting.  The second is a copy housed in the buffer on the printer.  In the ideal world, our user will keep the printed copy safe at all times and follow the organization's data destruction policy and destroy the copy of the document when they no longer require it.  As for the virtual copy created on the printer, the user has no real control over this, nor probably knows it even exists.  If we are lucky, the document is overwritten when the next print job comes through, but this is very dependent on the brand and model of printer and how the printer was initially set up by the administrator.

Slightly different to the straight printing of documents, scanning of documents or receiving faxes on a multi-functional printer writes documents to non-volatile areas of memory, usually a hard disk drive.  If documents are not manually removed, they will remain there indefinitely, often long forgotten by the original user that scanned the document or received the fax.

In either of these scenarios, improper disposal of a decommissioned printer could have catastrophic consequences for a company.  Leased printers may be returned to the leasing company for resale. Purchased printers are discarded in the trash or sold at auction or online via auction sites such as eBay. Either way, countless sensitive documents could pass into the hands of nefarious individuals.  While the leaking of some documents could financially affect organizations, leaking personal information pertaining to hundreds or thousands of customers or clients could have reputation ramifications that could destroy a company.

Most organizations do not realize the full potential of their printers or the functionality they have available.  While much functionality is non-security related, these functions have considerable impact on the security of the data within an organization and need to be understood and addressed.  These include, but are not limited to:

1. The ability to copy files to Windows or Unix SMB file servers

2. The ability to email scanned files to a user

3. Functionality that allows printers to receive faxes and then forward the fax onto predefined users via multiple methods, such as email or as another fax, and

4. The ability to store files which have been scanned, printed, emailed or uploaded locally on the printer.

While the previous data leakage scenarios have been accidental in nature, data remaining on printers could be the target of an educated attacker, one that understands the value of data residing on printers and who has the ability to compromise that data.  While organizations invest hundreds of thousands of dollars to secure their network, dividing networks and systems into zones of trust with firewalls, Intrusion Prevention Systems and other network access control points, have they rarely considered where printers are logically placed within the network.  In most cases, they are located among the users, or in some organizations, even on the server networks.  Some organizations do not even have zones of trust and the printers exist among users, servers and even Internet accessible systems.  In the worst case scenarios, the printers may even be Internet accessible themselves.  Printers are not seen as critical devices, and as such, are not secured in their own zone of trust where access to management interfaces is not accessible except to trusted printer administrators.  

By limiting access to these interfaces, compromise of the data housed on these printers becomes exceedingly difficult.

While most printers have the capability to authenticate both printer administrators or normal printer users, the majority of the time, this functionality is disabled or left in its default state; disabled.  Five minutes on Google and an attacker will be able to find the default password to almost any printer.  Once administrator access is gained to a printer, it takes little time and even less ability to make changes to settings that could be catastrophic to an organization.  While it would be little but annoying to find yourself locked out of your printer, or the interface changed to another language, so no-one could control the printer, if the attacker was to redirect your printing or copy documents to a location outside the internal network, depending on the contents of the file, it could ruin an organization.

So how does an organization protect itself against attacks against printers and leakage of sensitive data?

A few simple steps:

1. Disable unnecessary functionality.  If any function within the printer is not required within your business, disable it.  The less services or functions a printer has running, the less avenues of attack or leakage the printer has.

2. Add printers to your data retention and disposal policies.  Make sure all memory inside printers is disposed of via secure destruction or secure wiping when printers are decommissioned.

3. Ensure data is overwritten immediately after printing.  This requires the printer in use to support this functionality, but if your data is highly sensitive, this should be a priority when looking at new printers.

4. Print from memory rather than hard disk drive if available.

5. Use the secure printing option, if available, so printouts do not start before you reach the printer and enter your password.  How often have you hit print, walked to the printer and your printout is no-where to be seen, only to turn up lying on a table days or even weeks later?

6. Examine where printers are logically located within the network.  Printer management interfaces should be restricted and only accessible from defined management IP's.  Ensure printers are never accessible from the Internet.  Assess whether some or all printers should be located within their own zone of trust.

7. Use the inbuilt security within the printer to restrict who has access, what access they have and where they may access from.

Securing printers should be an integral part of securing your data.  Security policies should exist that address the risks and define how printers should be secured.  Develop printer security guidelines and procedures for implementation of new printers and follow these standards to ensure all printers are secured and do not become a high risk to your organization.  By securing your printers, you are contributing to your overall layered security model and protecting your organization's critical data along with its reputation.


Read more ...

Thursday, January 16, 2020

Ink Jet Or Laser Printer - Which is More Cost Effective For Your Needs?


Depending on your needs printing can be an integral and expensive part of your computer usage. Making a smart choice at point of purchase can save a lot of money over time and ensure that you own a printer which is capable of your desired performance. I will provide an overview of two of the most common type of computer printers; the ink jet and the laser.


An Ink Jet printer operates by propelling droplets of liquid molten material, otherwise known as ink, onto a medium, otherwise known as paper. They are the most popular type of computer printer due to its low cost, print quality, rich color and ease of use. Four major manufacturers account for a bulk of the sales as follows; Canon, Hewlett-Packard, Epson and Lexmark. Each of these manufacturers claims a substantial share of the credit for the development and evolution of the modern day inkjet. 

Your basic consumer ink jet printer has print cartridges which contain a series of tiny electronically heated chambers. The printer runs a pulse of current through the heating elements and this causes a steam burst in the chamber which forms a bubble and this propels a droplet of ink onto the paper.
A Laser printer is the second most common type of computer printer that produces excellent quality text and graphics onto plain paper. Images are produced by the direct scanning of a laser beam across the printer's photoreceptor. Laser printers use a xerographic printing process similar to digital photocopiers and MFPs. First, laser beam projects an image of the desired page onto it's electrically charged rotating drum. Then ink is sprayed onto the drum. 

The ink only adheres to the areas that were illuminated by the laser. The image is then printed on the paper by direct contact with the drum.

When trying to choose between an Ink Jet or Laser printer for your home or business, ink jet is the easy choice at a glance. The average purchase price is approximately $50.00 and many vendors will "throw them in" with the purchase of other hardware. Ink is the catch. The cost of the ink used for inkjet printers is typically a whopping $20 to $40 per cartridge which yields approximately 200 pages.

Thankfully, Kodak through a wrench into this sting last year by releasing the Kodak Easy Share 5500 all-in-one ( a printer, scanner, copier and fax machine). This printer retails at approximately $200.00 and its cartridges are available for $9.99 in black and $14.99 in color. This yields a net savings of 50% over your traditional ink jet printer. This resulted in other vendors slashing ink prices. Furthermore, Brother, Canon, HP and Lexmark began selling more cost effective inkjet printers as well as small business-friendly inkjets.

There is also an extensive line of laser printers available. Laser printers can be set up on and excel on large sophisticated networks. Lasers are durable on all media and provide the best overall print quality. They are better suited for high volume printing with higher capacity supplies and robust remote monitoring. Considering their high duty cycle these printers may be better suited in an environment where IT support is available, although there are low intervention rates. The original purchase price is more expensive than the inkjet but the yield per black ink cartridge is approximately 1000 pages. However, color printing is approximately four times as expensive as black and white. Hence, most people opt for the monochrome lasers and office staff is instructed to save color for special occasions!

Depending on your needs printing can be an integral and expensive part of your computer usage. Making a smart choice at point of purchase is going to require you to project usage and desired quality of output and on what types of media. Occasional usage at home is most likely best suited for an inkjet printer, keeping in mind that less expensive ink is available for certain models. In short, a laser printer is better suited for mass printing on a shared network. There are many in-between options available now especially in light of the cost competition heating up. This overview provided you at the very least with the right questions to ask while shopping!


Read more ...

Sunday, December 15, 2019

Computer Printers


Printers are machines that attach to computers as peripheral and help in producing a hard copy of any data that is stored in the computer.  On being given a command any document will get printed by a printer attached to that computer.  The printer uses a special ink, filled in cartridges and prints the data on different sizes on desired size of paper.


While many printers are individually connected to a specific computer, many others are connected to a network and are shared by a number of computer users simultaneously.  Such arrangements are very common in workplaces.  Many modern day computer printers also include non-printing features like fax and scan.  They are called multifunction or all-in-one depending on the feature availability in them.

The evolution of printers has seen various types of printers and printing technologies.  These became famous peripherals of the computers with the advent of dot matrix printers.  In such printers the machine relies on pixels or dots to print the document.  These were used quite excessively until the next generation of printers came.

The modern age laser printers can print at a much faster pace and can give output in hundreds.  These are generally toner based printers and are available in both colour and monochrome varieties.  Though some recent research has indicated that laser printers emit some harmful ultra fine particles, yet they still remain the most widely used and most popular printers in the corporate sectors.


Read more ...

Like Us

Correct-Tek Copier Service

Contact Form

Name

Email *

Message *