The Small And Medium-Sized Business Guide To Securing Printers

3y ago
9 Views
2 Downloads
8.00 MB
23 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Isobel Thacker
Transcription

The Small and Medium-Sized BusinessGuide to Securing PrintersConsiderations for improving printer securityacross modern business printers and common printing practices

Contents Executive Summary3 Part I. Managing the Conflict Between Business Productivity and IT Security4 Part II. A Pragmatic Approach to Securing SMB Printers5Four Categories of Security Threats to Printers5Printer Security Vulnerabilities9 Implementing a Security Strategy10Part III. A Checklist for Securing Printers11DevicePhysically secure printersApply security patches regularlySecure HDD/RAM12121313Disable unused physical ports13NetworkDo not expose printers to the public internetDisable unused communication portsSecure the SMB Wi-Fi NetworkFollow Microsoft’s advice: Disable Server Message Block v 1.0DataEncrypt data at rest and data in transitUser Identity and Access Management (IAM)Change default passwordsActively administer user authenticationEnable Internet Printing Protocol (IPP) printing171718181819User monitoringAudit and track printingCreate and regularly review logs191919 Conclusion20 About Epson WorkForce Printers For Business21 Sources22 About Epson23 11The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 21414151617

Executive Summary Purpose: This guide is intended to raise awareness of security issues related to modernbusiness printers and common printing practices, as well as considerations for improving“printer security in small- and medium-sized businesses (SMBs). Audience: This guide is intended for SMB professionals responsible for buying, installing, andUse this guide as a starting placesecuring printers in enterprise networks. This guide refrains from highly technical informationfor evaluating security issues, butto remain accessible to readers with limited backgrounds in IT and security.refer to product documentationfor detailed instructions Content Scope: This guide focuses on high-level security concepts rather than how-toimplementation. Use this guide as a starting place for evaluating security issues, but referto product documentation for detailed instructions. While many recommendations applyto printer settings, some measures must be implemented via other devices (e.g., networkrouters).“The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 3

Part I: Managing the Conflict Between BusinessProductivity and IT SecurityPrinters have rapidly advanced technologically in recent decades, bringing SMBsthe benefits of increased productivity and efficiency, as well as decreased costs.However, unlike printers of yore, printers today are essentially powerful computers.Consider the following printer features and functionality that are commonlyavailable off the shelf: to centrally administer enterprise printing practices. “Smart” features, such as log in to print“However, unlike printers of yore,“Smart” capabilities – Printers now integrate into print management systems, allowing SMBsand pull printing, help reduce waste, such as print-and-forget copies. Multifunction features – Printers often provide a range of capabilities in one device, fromprinters today are essentiallyprinting and scanning to faxing. Many newer models integrate with apps for features suchpowerful computersas printing or scanning to cloud-based servers, increasing the efficiency and productivity ofmobile employees. Native hard disk drive (HDD) and random access memory (RAM) – Many printers contain“local storage that, in years past, was available only on computers. Connectivity within the Internet of Things (IoT) – Given their powerful features andconnectivity to other IT devices, printers are nodes in an ever-expanding IoT.But the features and functionality that provide benefits also introduce potentialsecurity vulnerabilities and business risk, if not secured. The conflict betweenbusiness productivity and IT security is present in organizations of all sizes, but itcan be especially pronounced in SMBs. SMBs must carefully balance this conflict toensure profitability while not leaving the enterprise exposed to cyber risks.The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 4

“Some criticize describing threatsand vulnerabilities as spreadingfear, uncertainty, and doubt(FUD). The purpose here is not tostir FUD but to raise awarenessof facts“Part II: A Pragmatic Approach toSecuring SMB PrintersThe first step in balancing business productivity and IT security is to understandthe security threats to and vulnerabilities in printers, as well as the business risksthey pose. Some criticize describing threats and vulnerabilities as spreading fear,uncertainty, and doubt (FUD). The purpose here is not to stir FUD but to raiseawareness of facts. Whether acknowledged or not, security threats and printervulnerabilities exist. Ignoring them will not decrease the potential business risksthey pose. Four Categories of Security Threats to PrintersSecurity threats to printers entail four broad categories. Determining the likelihoodthat a threat will materialize as an attack can be tricky, given industry statistics onprinter attacks are sparse.However, industry surveys of IT security professionals provide some insight.These surveys report on the types and frequency of attacks encountered byenterprises over a specific timeframe, as well as what professionals view as the mostconcerning threats based on recent experiences.The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 5

“The easier an attack, themore likely the threat willmaterialize“The difficulty of conducting a type of attack must also factor into the threat’slikelihood. The easier an attack, the more likely the threat will materialize.Here, then, are the four categories of threat, ordered from the least to highestlikelihood. “Targeted Printer Attacks – Industry statistics suggest that hackers rarely target printersspecifically. However, it has occurred on occasion. For example, a “white hat” hacker carriedout a targeted cyberattack against printers [1] in early 2017 to raise awareness of printershared passwords are prevalentvulnerabilities. This attack was limited to forcing compromised devices to print a securitywarning for their owners.throughout businesses;Historically, targeted printer attacks have been limited for a few reasons. First, while attractivecompromising a log in tofor sabotage (e.g., forcing a printer to produce thousands of junk printouts), older printersprint password could turn upoffered hackers limited financial or intelligence value as a target. However, now that devicesthe password for data-richpossess local HDD/RAM (e.g., files sent to print) and often integrate with identity and accessmanagement (IAM) systems (e.g., user passwords), printers are viewed as more valuableuser devices or even IT admintargets than in the past. For instance, shared passwords are prevalent throughout businesses;credentialscompromising a log in to print password could turn up the password for data-rich user devices“or even IT admin credentials.Printer firmware (a native operating system, of sorts), historically, has been proprietary, whichprovided a degree of obscurity and a learning curve for hackers. But more information isavailable online today, decreasing the time and effort for hackers to learn underlying printersoftware and hardware systems for carrying out attacks. Remote Hacks – Perhaps slightly more common than targeted printer attacks are incidentsthat compromise printers as part of a broader-scale hack. In this scenario, unsecured printerscan serve as a hacker beachhead into an otherwise secure network environment. Printers canbe mapped as part of the enterprise network and, potentially, enable hackers to move laterallyThe Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 6

“In remote-hack scenarios, theSMB may not be the end goal“across the SMB network in search of more valuable targets, such as domain controllers thatstore passwords for many users and accounts. Such attacks require advanced skill, such as thatexhibited by professional cybercriminals or nation-state hackers.In remote-hack scenarios, the SMB may not be the end goal. It’s not uncommon forsophisticated hackers to exploit an SMB as an avenue to another victim, such as a governmentagency or larger business. An example of this occurred in the 2013 hack of Target Corp. Hackersfirst compromised one of the retailer’s HVAC contractors, an SMB that had remote access to aTarget intranet, which allowed hackers entry into Target’s enterprise network.Finally, printers can be affected by attacks such as ransomware, in which hackers encryptthe victim SMB’s data and require a ransom payment to decrypt it. Ransomware requiresconsiderably less skill than sophisticated multi-step hacks while also promising a moreimmediate financial reward for cybercriminals. SMBs are often compelled to pay because of theattack’s paralyzing effects on the business.“Devices under the remote Remote Harvesting – Hackers sometimes compromise large numbers of computers or IoTdevices (e.g., printers, webcams, smart TVs, etc.), which can then be controlled remotely aspart of a distributed network. Devices under the remote control of hackers are called bots,control of hackers are calledand many bots form a botnet. Botnets range in size from tens of thousands to tens of millions.bots, and many bots form aRecent examples include Mirai, Hajime, and Reaper, a new botnet discovered by securityresearchers [2] in October 2017.botnetBotnets are useful to hackers in conducting certain types of attacks, such as using thedistributed computing power to mine for cryptocurrencies. Botnets are also commonly usedfor distributed denial of service (DDoS) attacks, which overwhelm victim systems (e.g., web“server) with network traffic that makes the hosted resource unavailable to users (e.g., websites).DDoS attacks can target printers.The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 7

“To build a botnet, hackers oftenuse automated tools to scanthe internet for IoT devices withknown security vulnerabilities“To build a botnet, hackers often use automated tools to scan the internet for IoT deviceswith known security vulnerabilities. Once discovered, a hacker’s remote server initiates anautomated script that exploits the vulnerability. The hacker then controls the compromiseddevice as part of the botnet. Machines co-opted in a botnet often give no apparent warningto owners, which means there are thousands of compromised gadgets in botnets without theowners’ knowledge.Building a botnet doesn’t require the skill of other attacks, such as remote hacks, and the tools“(e.g., scanners, scripts, etc.) to build and control a botnet are readily available online. For thesereasons, this attack is slightly more likely than a targeted printer attack or remote hack.Perhaps most likely of all,unsecured printers lendthemselves to insiderthreats, whether maliciousor unintentional. Insidersmay obtain and/or discloseconfidential, sensitive, orproprietary data from printers Insider Threat – Perhaps most likely of all, unsecured printers lend themselves to insiderthreats, whether malicious or unintentional. Insiders may obtain and/or disclose confidential,sensitive, or proprietary data from printers. For insiders, obtaining the data can require little tono technical expertise or skill.Insiders are trusted users on SMB networks and premises. The insider threat, therefore,underscores the importance of physical security for printers.Along with ransomware, respondents identified insider threats as most concerning in the 2017SANS Data Security Survey [3]. The insider threat is notoriously difficult to detect and prevent.Further, the chances of an insider succeeding are high, even at organizations with world-classsecurity, as illustrated by repeatedly successful insider attacks at the U.S. National SecurityAgency and Central Intelligence Agency.“The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 8

“Because of their prevalenceand integral role in business,printers have recently attractedthe attention of securityresearchers to raise awareness ofvulnerabilities.“ Printer Security VulnerabilitiesThreats comprise one side of the risk equation. Vulnerabilities comprise the other.For threats to succeed as exploits, vulnerabilities must exist.Given printers’ rich features and robust functionalities, as well as networkingcapabilities, they present hackers with a large “attack surface.” In security, the attacksurface is analogous to a target: The bigger the target, the greater the chancesomeone will hit it, eventually. In a security context, the more code and the morenetwork connectivity, the higher the probability a determined hacker can find andexploit some underlying vulnerability therein.Because of their prevalence and integral role in business, printers have recentlyattracted the attention of security researchers to raise awareness of vulnerabilities.For instance, Jens Müller, Juraj Somorovsky, and Vladislav Mladenov havepublished academic papers [4] and a blog [5] describing common printer securityvulnerabilities.These researchers also built a tool called the PRinter Exploitation Kit (PRET) [6]for penetration testing, which is the practice of allowing hired hackers to attacksystems and networks to test security. The rationale is that it’s better for so-calledThe Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 9

“Thanks to emerging research andtools, white hats are discoveringvulnerabilities in printers andalerting vendors, who thendevelop security patches to fix thevulnerabilities“white hats – hackers employed by legitimate businesses – to discover securityvulnerabilities and alert organizations to them before so-called black hats discoverthem.Thanks to emerging research and tools, white hats are discovering vulnerabilitiesin printers and alerting vendors, who then develop security patches to fix thevulnerabilities. Explaining every printer vulnerability is beyond the scope of thisguide, but the Hacking Printers Wiki [7] provides an overview. Implementing a Security StrategyGiven the threats and vulnerabilities, SMBs should develop and implement astrategy for securing printers (and other IT assets).A pragmatic approach to retaining the business benefits of printers, while alsosecuring them, is to reduce the attack surface. Using a two-step evaluation process,SMBs can determine which features and functionality are needed or are notneeded, and then:1.Disable unneeded features and functionality.2.Properly configure and secure the required features and functionality.With this approach in mind, the next section presents a checklist to use forevaluating printer security.The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 10

Part III: A Checklist for Securing PrintersThis checklist introduces common security concepts, issues, and safeguardsrelevant to printers. Refer to the printer’s technical documentation for specific,how-to instructions. Some safeguards may need to be implemented via network/security appliances, such as routers and firewalls.The checklist contains the following subsections:“ Device – Recommends safeguards to physical printers, including native software andhardware.This checklist introduces common Network – Recommends ways to safeguard printers within the SMB network environment.security concepts, issues, and Data – Recommends safeguards to content and passwords. User identity and access management (IAM) – Recommends ways to ensure only authorizedsafeguards relevant to printersindividuals can access and use printers. User monitoring – Recommends ways to create an audit trail of printing activities, which can“be useful for business administration and security purposesThroughout the remainder of this section, an icon containing “EF” indicatescommon Epson printer features. An icon containing “ES” indicates that Epsonprinters support this security feature, although it might be implemented somehowother than via the printer (e.g., a network router). Some features include both iconsbecause, depending on the printer model and the method of implementation, thefeature could be native to the printer or supported via third-party solution (e.g., anapp).The Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 11

DevicePhysically secure printers"It doesn’t matter howGiven the likelihood of and printer vulnerability to insider threats, prioritize physicalsecurity.big yourcompany is Situate printers in secure areas – Space can be tight in any office, especially SMBs, but tryor what industry you’reto physically isolate printers used for sensitive data, such as financial and HR. A locked closetin. From the biggest blueworks, as will situating the printer close to an employee, such as an executive assistant or ITadministrator, who can monitor printing activities.chips to the smallestboutique firms, security is Don’t leave printouts unattended – Some information should be limited to as few people aspossible, such as payroll data and sensitive HR issues. (The government maxim for determiningcritical, especially when youaccess to classified information is “Need to Know.”) Configuring printers for log in to print or forconsider how many wayspull printing, which require the user to authenticate at the device before producing copies, willadd a measure of security as well as cost control (e.g., against accidental printing).sensitive data can becomeexposed, leaked, or stolen.By more tightly controlling Enable group security policies – Many large enterprises devote significant resources tosegmenting sprawling networks and administering group policies to limit access to and use ofresources by type of employee, department, etc. But what about SMBs? Complicated securitythe physical end of thepolicies aren’t feasible. Check with the printer vendor because some offer affordable solutionsnetwork – printers and thethat are easy to set up and simple to use, with enterprise-like features (e.g., Epson Print Admin).print queue – you can nowclose one of those big opendoors that worry securitypros to such a great extent."- Jeff Segarra,Senior Director at NuanceDocument Imaging DivisionThe Small- and Medium-Sized Business Guide to Securing PrintersConsiderations for improving printer security across modern business printers and common printing practicesPage 12

“Apply patches promptly toApply security patches regularlyWhen researchers discover a security vulnerability, vendors will sometimes issuea security patch, which is an update to the code that fixes the vulnerability. Moststandard updates bundle patches, but if the vulnerability is particularly severe andwidespread, a vendor may issue a standalone patch. (Such vulnerabilities usuallymake the news.) Apply patches promptly to prevent hackers from exploiting knownvul

compromising a log in to print password could turn up the password for data-rich user devices or even IT admin credentials. Printer rmware (a native operating system, of sorts), historically, has been proprietary, which provided a degree of obscurity and a learning curve for hackers. But more information is

Related Documents:

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

The share of employees in small and medium-sized enterprises amounted to 60.85% in relation to the employees of the Czech economy. According to Řehoř, in 2007 the small and medium-sized businesses will create and offer new and quality jobs. According to Srpová (2010), management of small and medium-sized enterprise has many specifics. In small

B. Protecting business interests 24 2. Business partners: a multiple stakeholder response 25 A. Participation of small and medium sized enterprises 25 i. Small and medium sized enterprises action 25 ii. Assisting small and medium sized enterprises - business linkages 26 a. Direct partnership with individual small and medium sized enterprises .