Reduce cyber risk with embedded security features

April 4, 20183 Minute Read

Select article text below to share directly to Twitter!


Meet James, an IT pro who loves his job. Every morning, he wakes up, feeds his dog Lenny, grabs a coffee, and heads into the office. James and his team are responsible for resolving office IT problems and protecting the company from threats. While he’s always busy, it’s a pretty sweet situation—stable job, good salary, great coworkers, interesting work, manageable hours—until a security crisis hits in the form of malware.

Suddenly, James goes from being on top of the world to on the verge of disaster. Without embedded security, a crisis like this is always a risk. No IT pro wants to end up like James, caught by surprise and struggling to stop the damage from spreading further. Find out how you can prevent this from happening to you:

Focus on endpoint security—before it’s too late

The Cyberthreat Defense Report by the CyberEdge Group discovered that 79 percent of networks in 15 different countries were breached in 2017. Beyond that, cybercrime damage costs are expected to hit $6 trillion annually by 2021. As IBM’s chairman, president, and CEO Ginni Rometty said, “Cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.” Scared yet?

The threat of hackers is accelerating and evolving at a rapid rate, stirring up a ton of trouble for office IT pros, like James. The internet gets bigger every year: New people come online, the number of mobile devices used in the workplace grows, and the Internet of Things (IoT) gains ground. While it’s exciting to adopt these endpoints, they tend to go overlooked from a security perspective, making them particularly vulnerable to attacks.

Don’t make the same mistake as James: He spent his time and energy focusing on traditional entry points for hackers, leaving the back door wide open.

Treat your printers like paper-munching servers

In reality, today’s complicated, fragmented security environment makes it almost impossible for IT teams to constantly monitor every potential vulnerability. That’s why devices like printers are dealt with as afterthoughts. But overlooking print security can create gateways for malware, especially since printers can be connected to LANs and come equipped with wireless adapters, services, apps, and more. In the words of technology blogger Chris Wahl, “Printers are really just paper-munching servers and should be treated as such by IT.”

It’s one thing to recognize the importance of printer security, but it’s another to put it in action. James and his fellow IT team members already have a ton on their plate. Even if they could focus on printer security, reaction time is everything. The longer it takes to identify an attack, the more damage it can inflict—and that’s why embedded security is the future of office IT.

Eliminate entry points with embedded security features

Many embedded security features can instantly detect and self-heal from malware attacks. The new HP Connection Inspector on HP Enterprise printers, for example, monitors a printer’s outbound network connections, uses patterns to identify normal behavior, and then recognizes and stops any activity that looks suspicious.

HP’s run-time intrusion detection also monitors the printer’s memory for intrusions and, if found, forces a reboot. If the malware embedded itself in the printer’s BIOS, don’t despair—HP Sure Start detects something is wrong and automatically reboots again, reloading the BIOS from a “golden copy” kept hidden within the printer. And yes, the printer can complete all these tasks without requiring any intervention from IT, allowing James and his team to focus their energy on other concerns.

At the end of the day, the only way to effectively protect your organization and its endpoints is through continuous monitoring, multilayered defense, and automatic responses that can stop attacks in their tracks. By utilizing PCs and printers with embedded security features, organizations can become more secure, resilient, and efficient. James may be good at his job, but all it takes is one unsecured device or point of weakness for disaster to unfold. So take advantage of security technology advancements, save your IT team some much-needed time, and ensure James gets home on time to feed Lenny dinner.

  • Recommended for you
  • Recommended for You