All Services

From back-end infrastructure to personal productivity, Ergo has the knowledge and experience to match technology to all our client requirements. Our strength is understanding your business. The end goal is always the same, to make businesses more agile and competitive.

More About Our Services
Managed Services

Focus on your core business and leave ICT operations and management to the experts. From 24/7 service desk support to managing hybrid clouds, Ergo have the depth and experience to meet the most demanding service level requirements and ensure continuous improvement. 

More About Managed Services

Highlighted Services

Managed People

Competition for talented technology professionals is huge, which is why we make hiring more personal, taking time to match the right people to the right roles. Our technical experience and recruiting know-how help find the perfect fit for both parties.  

More About Managed People

Highlighted Services

Consultancy Services

Speed of change demands a new generation of digital investments that will drive business enablement and profitability. We support IT leaders, wherever they are on their digital transformation journeys, with our digital assessment methodology. 

More About Consultancy Services

Highlighted Services

Print and Document Solutions

Our goal is to deliver the best possible print and document service for you, leveraging the latest technologies and innovation to ensure the performance of your print environment is optimised to maximise employee productivity.  We take out costs, add efficiencies, wrap it in end-to-end security and make print integral to digital transformation. 

More About Print and Document Solutions

Highlighted Services

Cloud

Agility is key to business success and the cloud is where to get it. We offer a wide range of cloud services – public, private, hybrid – and provide the best of both worlds by integrating or migrating legacy systems to streamline the way your IT is consumed. 

More About Cloud

Highlighted Services

Digital Enablement

Ergo provides a clear roadmap for digital transformation with practical steps to make businesses more agile and customer-centric

More About Digital Enablement

Highlighted Services

Mobility and Collaboration

Ergo has provided many of Ireland’s largest organisations with an ecosystem of mobile applications and collaboration services that drive productivity without compromising on security

More About Mobility and Collaboration

Highlighted Services

Software Licensing

Businesses struggle to manage software assets and don’t always get the best value. We can help streamline your software purchasing, simplify deployments and maximise your investments. 

More About Software Licensing

Highlighted Services

Security, Risk and Compliance

Risks around cyber security and data protection are an ever-increasing challenge for businesses. We provide security lifecycle management, from perimeter testing and threat analysis to mitigating the impact of a breach. 

More About Security, Risk and Compliance

Highlighted Services

Microsoft Technology Specialisations

With the largest team of Microsoft IT professionals in Ireland – including two Most Valuable Professionals our expertise spans a comprehensive portfolio of products/services

More About Microsoft Technology Specialisations

Type your query and press the "Search now" button

Should an IT Security Strategy include MFD’s?

Should an IT Security Strategy include MFD’s?

According to InfoTrends, there are almost 30 million printers and MFDs in Western Europe and the U.S. and most are connected to a network. 

Read The Article
Should an IT Security Strategy include MFD’s?
Return to Blog

Should an IT Security Strategy include MFD’s?

According to InfoTrends, there are almost 30 million printers and multifunction devices (MFDs) in offices throughout Western Europe and the U.S. and most are connected to a network. This means they are just as vulnerable to malware and hacker attacks as PCs, but for a variety of reasons they are often overlooked by IT professionals and used without proper safeguards by employees.

I have been working in the managed print services (MPS) space for over 15 years and have been warning of the dangers of MFD security. In the last couple of years the demand for printer security has finally increased. I’m often asked the question by customers, if their IT security strategy should include MPD’s and the answer is "100% yes". However, I still see holes in the print security of many organisations.

Security threats are real, and as printing and imaging devices become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device or the entire network. This is due to the lack of security on networked devices which are not controlled by network firewalls, leaving printing and imaging devices often overlooked and exposed. In Europe, Quocirca research showed that 70% of organisations have suffered a print security breach.

The first step in making sure that your company doesn’t fall prey to such a data breach is to understand the risk your print environment poses and then develop a strategy to manage this risk.

Improve your print fleet’s security through these 5 simple steps: 
  1. Introduce simple role based printing and document right policies to ensure that print jobs are only seen by the author.
  2. Ensure that you use a supplier who operates a recognised process for the removal and disposal of printing devices.
  3. Use a secure pull print solution, data overwrite and encryption processes.
  4. Review your existing infrastructure, policies and technologies and look for external reviews as the introduction of a trusted supplier can often lead to higher levels of security than many companies can achieve in-house.
  5. Take advantage of enhanced security systems for MFD’s and printers, such as the HP JetAdvantage Security.

Step 5 is key as these technologies help to safeguard the printing and imaging devices from attacks, creating ease of mind for IT managers and removing the need for intervention from IT staff. Any notifications regarding risks can be sent to IT directly. HP are leading the way in this space and have developed and deployed an end-to-end printing security strategy, an industry first in security management. 

HP Futuresmart enterprise models are monitored by 3 key technologies:
  1. HP Sure Start: As your printer powers on for the first time, HP Sure Start works in the background, validating the BIOS at every power cycle and also inspecting the FutureSmart firmware. If the BIOS is in any way compromised, the printer will reboot to a “safe mode” version of the BIOS. This gives the end user the time to download a new, safe copy of firmware to be uploaded to the printer.
  2. Whitelisting: MFDs these days are much like the end-user computer, they incorporate memory, processor, hard drives and software. In order for these components to integrate and communicate, the FutureSmart firmware is uploaded to the internal hard drive of the printer. Whitelisting ensures that the firmware is genuine and uncompromised, and if there is any detection of an intrusion, the device again, boots into the “safe mode” function and notifies the relevant group/person.
  3. Run-Time Intrusion: Companies install their MFD on their network unaware that these are prime targets for network intrusion. Although a firewall is configured for a client’s network to safeguard their systems, printers installed on the same network are open to malware/virus attacks by other sources. Run-Time Intrusion is a live protection service which, if an intrusion is detected, automatically reboots the device.

The HP FutureSmart firmware includes these 3 functions as standard. To increase security for your business the benefits of the FutureSmart firmware and current devices should not be overlooked. It is useful and productive and brings multiple benefits for IT operators. HP Jetadvantage Security Manager is an application that comes as standard on the latest HP FutureSmart enterprise models. This gives the customer a continuous assurance of security policy settings. These settings are deployed through the use of a security compliance tool. Within the application, the IT department can create policy templates to be distributed to devices in their print environment. It allows numerous tasks to be run within the policy editor including:

  • Policy validations to identify missed items and potential conflicts
  • Adding, verifying and grouping devices
  • Assessing devices to set up recurring tasks
  • Running executive level risk based reporting
  • Providing detailed reports on assessments and remediation

By implementing these types of solutions for clients, we are starting to see that users are no longer scared of the risks that MFDs pose. Security assessments and workshops help identify and target specific security risks within your current fleet and also help with a standard security policy for the future. We soon should see a time where the MFD is considered a “real” piece of networked hardware rather than an “outsider” and taking the time to protect it is just as important as all other networked devices.

Register for our Print Security Workshop on Thurs 5th Oct here.

News and Blog Posts

What monsters are lurking in the shadows?
Phil Ryan
28 November 2017 • Posted By Phil Ryan CRM Solutions Manager

What monsters are lurking in the shadows?

It is said that ancient maps would label dangerous and unexplored territories with a dire warning for sailors to avoid...

Read now
Containers: Radically changing how we develop software
Dave Muldoon
03 November 2017 • Posted By Dave Muldoon Business Development Director - Managed People

Containers: Radically changing how we develop software

Containerisation is going to be huge. Huge. It’s going to turn the world of software development upside down. ...

Read now
CRM: Coming in to the mainstream
News 05 December 2017

CRM: Coming in to the mainstream

Read Now
Mobile Business: Navigating the unseen obstacles - Sunday Business Post
News 28 November 2017

Mobile Business: Navigating the unseen obstacles - Sunday Business Post

Read Now
Managed Services: How to get by - Connected Magazine, Sunday Business Post (Abstract)
News 07 November 2017

Managed Services: How to get by - Connected Magazine, Sunday Business Post (Abstract)

Read Now

Subscribe to Our Blog

Scroll to Top