Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer

By Mark Gerlach
September 01, 2016

Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers, according to Judy Selby, managing director in BDO Consulting's technology advisory services practice.

“Today's printers pose a variety of security threats for law firms,” Selby, a former partner at Baker Hostetler and co-chair of the firm's information governance team, told our ALM sibling Legaltech News via e-mail. “(M)odern multifunction printers, or MFPS, like all other devices on the enterprise's network, are endpoints (like PCs) that must be protected.”

Printers are a risk for a number of reasons, Selby says. They can communicate within and outside a corporate network. Printers can also contain storage devices holding confidential data. Multifunction printers (MFPs) combine several functions in one device, such as scanning, copying, faxing, and sending e-mails.

HP Inc. has security protections embedded in its printers ( e.g. , LaserJet and PageWide Enterprise printers), such as run-time intrusion detection and a firmware vetting process called whitelisting, Eileen Griffee, industry consultant at HP Inc., says.

Despite the protections, Griffee recommends law firms also use security software and services. “Law firms that do not take steps to secure their print infrastructure, like they do for PC endpoints, are at risk for an expensive, disruptive data breach,” she says. “[L]aw firms should be working with their print vendors to ensure that their printers include embedded security to prevent malicious intrusion, along with securing data streams and hardcopy documents.”

HP provides security software, including JetAdvantage Security Manager, as well as services.

Law firms aren't going paperless anytime soon, says Selby. “Mitigating the risks associated with MFPs should be an important part of every firm's cybersecurity plan.”

Selby shared a few tips on how printers can be secured at law firms:

1. Keep Printers on Security's Radar

Printers should be treated as part of a firm's IT infrastructure, included in its cybersecurity plan, and placed behind its firewall, Selby says.

2. Unused Features, Passwords and Updates

Unused Features: “(A)lthough modern MFPs may offer hundreds of security setting options, firms need to disable unused features and activate them with proper security enabled,” Selby says.

Passwords: “Default administrator names, passwords, and wireless service set identifiers (SSIDs) must be changed and secured.”

Updates: “Scanning configurations should be standardized for all MFPs,” Selby says. “Installation of security updates should be included within the firm's cybersecurity protocols.”

3. Monitor Activity, Avoid Unsecured Printers

“Firms should also maintain an audit trail of all MFP activity, including all copy, print, scan, e-mail, and fax jobs,” Selby says.

“Improperly configured and unprotected MFPs can provide a point of entry by hackers into the firm's network, so there should be a zero tolerance policy with regard to the use of MFPs that are not maintained as part of the firm's IT infrastructure.”

4. Encryption, Tossing Old Data

“Firms also need to protect communications between other devices and MFPs,” Selby says. “Data transmitted to and from MFPs should be encrypted. Users should be authenticated and firms should consider restricting the destinations to which MFPs can email or fax data. The data stored on MFPs creates additional security risks, both at the time the firm is actively using the MFP and when it is taken out of service. If an active MFP is not properly secured behind the firm's firewall, the data stored on its hard drive is vulnerable to hackers. Firms should consider encryption for that stored data. In addition, care should be taken to ensure that all stored data is removed at the time the MFP is retired.”

5. Limit Access

“In addition to these steps, firms also must remember to secure the actual printing processes,” Selby concludes. “At a minimum, firms should limit physical access to printers and enforce a 'clean printer' policy, so that printed documents in an MFP output tray are not left sitting unprotected. In certain situations, controls can be put in place to require user authorization at the MFP itself before the print job is completed.”


Mark Gerlach writes for our ALM sibling, Legaltech News.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access Lawsuit Image

Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.

Fresh Filings Image

Notable recent court filings in entertainment law.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.