CIOReview
| | NOVEMBER 20198CIOReviewBy Hiro Imamura, SVP and GM, Business Imaging Solutions Group, Canon U.S.A.There is a pressing need for enterprises to continue to reconsider how they think about cybersecurity in the wake of a mounting magnitude of data and content security breaches impacting companies on a global scale. But in order for organizations to preemptively combat and proactively address potential pitfalls, they must first pinpoint the potential weak links in their security chains. And while most enterprises understand the importance of data and network security, they may not be able to readily identify the problem areas and the necessary steps to take to implement security features and practices in the workplace.Common shortcomings in an enterprise's security protocols typically include hardware and software vulnerabilities due to a lack of advanced features, such as access control and usage tracking, as well as plain human error. A recent study conducted by Keypoint Intelligence, the market intelligence firm for the digital imaging industry, cites that even organizations that understand the importance of data security may not be including their MFP devices in their security policies.Copiers and printers are such inherent office fixtures that employees commonly assume that they cannot possibly be a security risk. If businesses do think about controlling printer usage, it may only be as a way to manage the cost of printing. Yet, today's MFPs play an integral role in the larger, connected landscape and, as such,MFPS SHOULD INCORPORATE AN ARRAYof advanced security features that can help users limit access to sensitive business information. Such features might restrict or allow device functionality based on employees' roles and responsibilities or even create audit trails for compliance purposes.PINPOINTING WEAK LINKS IN AN ENTERPRISE SECURITY CHAIN:HELPING COMPANIES BATTLE DATA AND CONTENT SECURITY CHALLENGESIN MY OPINION
< Page 7 | Page 9 >