It appears you are blocking scripts.

User's browsing experience may vary drastically without enabling Javascript!

Please enable javascript in your browsers settings to have a proper viewing experience!

Print Devices: An Overlooked Network Security Risk by HP and IDC Skip to main content

Print Devices: An Overlooked Network Security Risk by HP and IDC

Fri Sep 11, 2020 | Genesis Technologies

Print devices are significantly overlooked in most IT security strategies, despite clear evidence they are an easy target for cyber criminals.

Print devices are not getting enough attention in the enterprise’s IT security strategy. Only 30% of IT professionals recognize printers as a high security risk, according to a May 2018 Spiceworks survey.

And yet 59% of organizations have reported a print-related data loss in the past year, according to a 2019 Quocirca analysis and trend report.

Cyber threats targeted toward printer and Internet of Things (IoT) devices have increased more than 200%, according to the 2019 SonicWall Cyber Threat Report.

The writing is on the wall: As an endpoint device attached to the network, the print device is a significant security risk, Just like IoT sensors, today’s modern, intelligent, programmable print devices are routinely connected to the internet and the corporate network-in turn expanding the enterprise cyber attack surface.

“With the universe of connected devices growing exponentially, so is the sophistication and volume of cyber attacks and data breaches; this includes an increase in focus on enterprise printers, which tend to be more sophisticated devices on the network comparable to PCs, “Shivaun Albright, Chief Technologist of Print Security at HP, told Forbes.

Download this white paper that examines why print devices make easy targets for cyber criminals and how organizations can better address print device security to manage and help reduce risk.

Learn the 5 steps toward print device security:
1. Assess security and risk
2. Buy with security in mind
3. Strengthen printer use and maintenance
4. Continuously monitor
5. Consult with experts

Download White Paper

Need more? Watch these three videos on how partnering with HP can protect your network with Run-time Intrusion Detection, HP Sure Start and Connection Inspector.
  • Stay a step of the bad guys with HP Run-time Intrusion Detection (RTID)

  • Protect your network with HP Sure Start

  • Detect, protect and automatically recover with HP Connection Inspector

Let Genesis Technologies perform an in-depth security risk assessment, including a detailed security risk report down to the device level, security policy guidance and solution recommendations.

Contact Us



Stay in the Know

Stay up to date with Genesis Technologies.