{"id":119,"date":"2019-06-11T04:30:31","date_gmt":"2019-06-11T04:30:31","guid":{"rendered":"https:\/\/www.shipndestroy.com\/blog\/?p=119"},"modified":"2019-06-11T04:30:31","modified_gmt":"2019-06-11T04:30:31","slug":"is-your-printer-under-attack","status":"publish","type":"post","link":"https:\/\/www.shipndestroy.com\/blog\/is-your-printer-under-attack\/","title":{"rendered":"Is Your Printer Under Attack?"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong><em>How to Protect Your Printer Network from Cyber Attack FREE Seminar from Symquest<\/em><\/strong><\/h4>\n\n\n\n<p>Back in 2017, a team of <a rel=\"noreferrer noopener\" aria-label=\"German researchers analyzed 20 printers and multi-function printers (opens in a new tab)\" href=\"https:\/\/www.securityweek.com\/printer-vulnerabilities-expose-organizations-attacks\" target=\"_blank\">German researchers analyzed 20 printers and multi-function printers<\/a> and uncovered several vulnerabilities that can be exploited to crash a device or obtain sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How Can My Printer Be a Security Risk?<\/strong><\/h3>\n\n\n\n<p>Your printer is a treasure trove of data. Take a look at these vulnerabilities:<\/p>\n\n\n\n<p><strong>Stored Documents and Email Addresses: <\/strong>Many printers auto-store emails and sensitive documents like Annual Reports, Profit and Loss Statements and other data that is lucrative to a hacker (and your competitors\u2026)<\/p>\n\n\n\n<p><br><strong>Launch Phishing or Malware Attacks: <\/strong>A hacker can use printers to send email disguised as the authentic sender. So if your Admin\u2019s email is stored as a sender in your printer\u2019s directory, a fake \u201curgent message, please open\u201d email could be sent to your entire staff (or worse, your client list\u2026) that could send malware causing untold damage to your entire network and those of your clients. <\/p>\n\n\n\n<p>Through the month of June, our friends at Symquest are offering free seminars on how to protect your company from: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Social Engineering \u2014 The Attack Life Cycle<\/li><li>Secure Printing \u2014 &#8220;Hardening&#8221; Your MFP<\/li><li>Everyday Security Considerations \u2014 Email, Scanning, Fax and Mobile Print<\/li><li>Multi-functional Printers \u2014 Potential Points of Failure<\/li><li>Secure Communication \u2014 Encryption &amp; Closing Portals<\/li><li>Additional Security \u2014 Print Management &amp; Software Applications<\/li><li>Maximizing Your MFP \u2014 Paperless Fax, User Boxes &amp; Mobile Features\u00a0<\/li><\/ul>\n\n\n\n<p class=\"button\"><a href=\"https:\/\/blog.symquest.com\/news-events\/document-security-free-seminar-series-symquest-announces-regional-seminar-tour-in-june\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Register and Learn More (opens in a new tab)\">Register and Learn More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Protect Your Printer Network from Cyber Attack FREE Seminar from Symquest Back in 2017, a team of German researchers analyzed 20 printers and multi-function printers and uncovered several vulnerabilities that can be exploited to crash a device or obtain sensitive information. How Can My Printer Be a Security Risk? Your printer is a &hellip; <a href=\"https:\/\/www.shipndestroy.com\/blog\/is-your-printer-under-attack\/\">More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-119","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":1,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"predecessor-version":[{"id":120,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/119\/revisions\/120"}],"wp:attachment":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}