{"id":26404,"date":"2017-02-16T13:19:37","date_gmt":"2017-02-16T13:19:37","guid":{"rendered":"https:\/\/udsenterprise.com\/successful-print-security-plan\/"},"modified":"2023-09-21T12:46:34","modified_gmt":"2023-09-21T12:46:34","slug":"successful-print-security-plan","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/","title":{"rendered":"A successful print security plan in 8 steps"},"content":{"rendered":"<p><strong>Quocirca\u2019s latest report \u201cPrint security<\/strong>: An imperative in the IoT era\u201d discusses the many points of <strong>vulnerabilities<\/strong> around print and recommends that the following <strong>measures<\/strong> are taken:<\/p>\n<p><strong>-Ensure<\/strong> print devices are part of an overall information security strategy. <\/p>\n<p><strong>-Adopt a security policy<\/strong> for the entire printer fleet. <\/p>\n<p><strong>-Secure the device:<\/strong> For instance, hard disk encryption adds an additional layer of security. <\/p>\n<p><strong>-Secure access:<\/strong> Implement user authentication to eliminate the risk of unclaimed output being left in printer trays. <\/p>\n<p><strong>-Secure the document:<\/strong> Digital rights management capabilities can further discourage unauthorised copying or transmission of sensitive or confidential information. <\/p>\n<p><strong>-Ongoing monitoring and management:<\/strong> To ensure compliance and to trace unauthorised access, organisations need a centralised and flexible way to monitor usage across all print devices. <\/p>\n<p><strong>-Seek expert guidance:<\/strong> Manufacturers and Managed Print Service (MPS) providers continue to develop and enhance their security products and services. <\/p>\n<p><strong>-Ultimately, print security demands a comprehensive approach<\/strong> that includes education, policy and technology.<\/p>\n<p>Source: <a href=http:\/\/www.computerweekly.com\/blog\/Quocirca-Insights\/8-steps-for-implementing-a-successful-print-security-plan target=\"_blank\" rel=\"nofollow\">Computer Weekly<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Printers and multifunction printers (MFPs)<\/strong> are not immune to the <strong>security threat<\/strong> and are vulnerable to the same risks as any device on the network. As <strong>IoT devices<\/strong> they are susceptible to the growing threat of <strong>DDoS attacks<\/strong> \u2013 left unsecured they are an <strong>open door<\/strong> to the corporate network. <\/p>\n","protected":false},"author":2,"featured_media":12635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[926,971],"tags":[928,972],"class_list":["post-26404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips","tag-security","tag-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A successful print security plan in 8 steps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A successful print security plan in 8 steps\" \/>\n<meta property=\"og:description\" content=\"Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growing threat of DDoS attacks \u2013 left unsecured they are an open door to the corporate network.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-16T13:19:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:46:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"A successful print security plan in 8 steps\",\"datePublished\":\"2017-02-16T13:19:37+00:00\",\"dateModified\":\"2023-09-21T12:46:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/\"},\"wordCount\":167,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/printing_security_plan.jpg\",\"keywords\":[\"Security\",\"Tips\"],\"articleSection\":[\"Security\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/\",\"name\":\"A successful print security plan in 8 steps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/printing_security_plan.jpg\",\"datePublished\":\"2017-02-16T13:19:37+00:00\",\"dateModified\":\"2023-09-21T12:46:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/printing_security_plan.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/printing_security_plan.jpg\",\"width\":840,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/successful-print-security-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A successful print security plan in 8 steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/VirtualCable_\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/virtualcable\",\"https:\\\/\\\/www.youtube.com\\\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A successful print security plan in 8 steps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/","og_locale":"en_US","og_type":"article","og_title":"A successful print security plan in 8 steps","og_description":"Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growing threat of DDoS attacks \u2013 left unsecured they are an open door to the corporate network.","og_site_name":"UDS Enterprise","article_published_time":"2017-02-16T13:19:37+00:00","article_modified_time":"2023-09-21T12:46:34+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"A successful print security plan in 8 steps","datePublished":"2017-02-16T13:19:37+00:00","dateModified":"2023-09-21T12:46:34+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/"},"wordCount":167,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/printing_security_plan.jpg","keywords":["Security","Tips"],"articleSection":["Security","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/","url":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/","name":"A successful print security plan in 8 steps","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/printing_security_plan.jpg","datePublished":"2017-02-16T13:19:37+00:00","dateModified":"2023-09-21T12:46:34+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/printing_security_plan.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/printing_security_plan.jpg","width":840,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/successful-print-security-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/udsenterprise.com\/en\/category\/security\/"},{"@type":"ListItem","position":3,"name":"A successful print security plan in 8 steps"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=26404"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26404\/revisions"}],"predecessor-version":[{"id":28637,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26404\/revisions\/28637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/12635"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=26404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=26404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=26404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}