All Services

From back-end infrastructure to personal productivity, Ergo has the knowledge and experience to match technology to all our client requirements. Our strength is understanding your business. The end goal is always the same, to make businesses more agile and competitive.

More About Our Services
Managed Services

Focus on your core business and leave ICT operations and management to the experts. From 24/7 service desk support to managing hybrid clouds, Ergo have the depth and experience to meet the most demanding service level requirements and ensure continuous improvement. 

More About Managed Services

Highlighted Services

Managed People

Competition for talented technology professionals is huge, which is why we make hiring more personal, taking time to match the right people to the right roles. Our technical experience and recruiting know-how help find the perfect fit for both parties.  

More About Managed People

Highlighted Services

Consultancy Services

Speed of change demands a new generation of digital investments that will drive business enablement and profitability. We support IT leaders, wherever they are on their digital transformation journeys, with our digital assessment methodology. 

More About Consultancy Services

Highlighted Services

Print and Document Solutions

Our goal is to deliver the best possible print and document service for you, leveraging the latest technologies and innovation to ensure the performance of your print environment is optimised to maximise employee productivity.  We take out costs, add efficiencies, wrap it in end-to-end security and make print integral to digital transformation. 

More About Print and Document Solutions

Highlighted Services

Cloud

Agility is key to business success and the cloud is where to get it. We offer a wide range of cloud services – public, private, hybrid – and provide the best of both worlds by integrating or migrating legacy systems to streamline the way your IT is consumed. 

More About Cloud

Highlighted Services

Digital Enablement

Ergo provides a clear roadmap for digital transformation with practical steps to make businesses more agile and customer-centric

More About Digital Enablement

Highlighted Services

Mobility and Collaboration

Ergo has provided many of Ireland’s largest organisations with an ecosystem of mobile applications and collaboration services that drive productivity without compromising on security

More About Mobility and Collaboration

Highlighted Services

Software Licensing

Businesses struggle to manage software assets and don’t always get the best value. We can help streamline your software purchasing, simplify deployments and maximise your investments. 

More About Software Licensing

Highlighted Services

Security, Risk and Compliance

Risks around cyber security and data protection are an ever-increasing challenge for businesses. We provide security lifecycle management, from perimeter testing and threat analysis to mitigating the impact of a breach. 

More About Security, Risk and Compliance

Highlighted Services

Microsoft Technology Specialisations

With the largest team of Microsoft IT professionals in Ireland – including two Most Valuable Professionals our expertise spans a comprehensive portfolio of products/services

More About Microsoft Technology Specialisations

Type your query and press the "Search now" button

Should an IT Security Strategy include MFP’s?

Should an IT Security Strategy include MFP’s?

Read The Article
Should an IT Security Strategy include MFP’s?
Return to Blog

Should an IT Security Strategy include MFP’s?

According to InfoTrends, there are almost 30 million printers and multifunction devices in offices throughout Western Europe and the U.S. and most are connected to a network. This means they are just as vulnerable to malware and hacker attacks as PCs, but for a variety of reasons they are often overlooked by IT professionals and used without proper safeguards by employees.

I have been working in the managed print services space for over 15 years and have been warning of the dangers of MFP security. In the last couple of years the demand for printer security has finally increased. I’m often asked the question by customers, if their IT security strategy should include MPF’s and the answer is 100% yes. However, I still see a hole in the print security of many organisations.

Security threats are real, and as printing and imaging devices become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device or the entire network. This is due to the lack of security on networked devices which are not controlled by network firewalls, leaving printing and imaging devices often overlooked and exposed. In Europe, Quocirca research showed that 70% of organisations have suffered a print security breach.

The first step in making sure that your company doesn’t fall prey to such a data breach is to understand the risk your print environment poses and then develop a strategy to manage this risk.
There are 5 simple steps to include in this strategy which will improve your print fleet’s security:

  1. Introduce simple role based printing and document right policies to ensure that print jobs are only seen by the author.
  2. Ensure that you use a supplier who operates a recognised process for the removal and disposal of printing devices.
  3. Use a secure pull print solution, data overwrite and encryption processes.
  4. Review your existing infrastructure, policies and technologies and look for external reviews as the introduction of a trusted supplier can often lead to higher levels of security than many companies can achieve in-house.
  5. Take advantage of enhanced security systems for MFP’s and printers such as the HP JetAdvantage Security.

Step 5 is key as these technologies help to safeguard the printing and imaging devices from attacks, creating ease of mind for IT managers and removing the need for intervention from IT staff. Any notifications regarding risks can be sent to IT via applications such as Jetadvantage Security Manager and ArcSight.

HP are leading the way in this space and have developed and deployed an end-to-end printing security strategy, an industry first in security management.

The latest HP Futuresmart Enterprise models are monitored by 3 key technologies:

1. HP Sure Start:

As your printer powers on for the first time, HP Sure Start works in the background, validating the BIOS at every power cycle and also inspecting the FutureSmart Firmware. If the BIOS is in any way compromised, the printer will reboot to a “Safe Mode” version of the BIOS. This gives the end user the time to download a new, safe copy of Firmware to be uploaded to the printer.

2. Whitelisting:

Multi-function devices these days are much like the end-user computer, they incorporate memory, processor, hard drives and software. In order for these components to integrate and communicate, the Futuresmart firmware is uploaded to the internal hard drive of the printer. Whitelisting ensures that the firmware is genuine and uncompromised, and if there is any detection of an intrusion, the device again, boots into the “safe mode” function and notifies the relevant group/person.

3. Run-Time Intrusion:

Companies install their multi-function devices on their network unaware that these are prime targets for network intrusion. Although a firewall is configured for a client’s network to safeguard their systems, printers installed on the same network are open to malware/virus attacks by other sources. Run-Time Intrusion is a live protection service which, if an intrusion is detected, automatically reboots the device.

The Futuresmart Firmware includes these 3 functions as standard. To increase security for your business the benefits of the HP Futuresmart Firmware and current devices should not be overlooked. It is useful and productive and brings multiple benefits for IT operators.
             
HP Jetadvantage Security Manager is an application that comes as standard on the latest HP Futuresmart Enterprise models. This gives the customer a continuous assurance of security policy settings.
These settings are deployed through the use of a security compliance tool. Within the application, the IT department can create policy templates to be distributed to devices in their productive print environment.
It allows numerous tasks to be run within the policy editor including:

  • Policy validations to identify missed items and potential conflicts
  • Adding, verifying and grouping devices
  • Assessing devices to set up reccurring tasks
  • Running executive level risk based reporting
  • Providing detailed reports on assessments and remediation

By implementing these types of solutions for clients, we are starting to see that users are no longer scared of the risks that multifunction printers pose. Security assessments and workshops help identify and target specific security risks within your current fleet and also help with a standard security policy for the future. We soon should see a time where the MFP is considered a “real” piece of networked hardware rather than an “outsider” and taking the time to protect it is just as important as all other networked devices.

Contact us to arrange a Print Security Assessment.

News and Blog Posts

What is ISO 27001 and Why Do I Need It?
22 May 2018 • Posted By Nikos Vasileiadis IT Security Officer

What is ISO 27001 and Why Do I Need It?

The field of cybersecurity is changing rapidly, and the challenges faced by businesses are mounting considerably. Couple this together with...

Read now
Power BI: 6 Steps to building reports that really work
Kate Cunningham
17 May 2018 • Posted By Kate Cunningham

Power BI: 6 Steps to building reports that really work

In an era of Big Data, analytical strategic decision making is becoming pivotal for success. Managers at every level are...

Read now
Managed Print and Document Services: Navigating a Sea of Data
News 10 May 2018

Managed Print and Document Services: Navigating a Sea of Data

Read Now
CRM: Don’t just jump on the bandwagon
News 14 March 2018

CRM: Don’t just jump on the bandwagon

Read Now
Business Analytics and Big Data: How to Read the Future
News 14 March 2018

Business Analytics and Big Data: How to Read the Future

Read Now

Subscribe to Our Blog

Scroll to Top