![]() ![]() Hackers are continually seeking out bugs and exploitable weaknesses in software and when these are reported or detected through regular, best-practice checks, developers design a fix which is then sent out as a firmware update. One easy resolution that could save you falling victim to an attack is to make sure you’re using the latest version of the operating software for all your systems. ![]() Hackers are shifting their focus to the supply chain and smaller firms which might be easier targets and this risk has been accentuated as more people work from home, using devices that may not be subject to the same rigorous security protocols as those in the office. This apathy may be in part due to seeing this threat as the preserve of large companies, but that’s no longer the case. ![]() Yet according to our research, only a quarter of IT professionals are looking to invest in print security, 75 per cent have never invested in document encryption and 56 per cent are not using user authentication. ![]() Research from Quocirca 1 shows that more than one in ten of all security incidents that affect a business involve a printer, 59 per cent of which result in data being lost. But the role printers play within a network is often overlooked, despite them being an integral part of nearly every company’s infrastructure.Ĭriminals are increasingly targeting printers as well as other connected devices, from scanners to vending machines, because of their sophistication and functionality. Security is a clear priority for IT professionals. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |