Secure printing
How to mitigate risks while dealing with secure printing matters
Schwerpunkt Awareness
First Online:
- 80 Downloads
Abstract
Business and transaction documents printed by users or in captive printing and mailing operations are susceptible to security breaches. Awareness of the related risks is crucial for corporations.
Keywords
Information Security Intellectual Property Right Security Breach Information Security Management Printing Environment
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- [1]A typical MFP may act as a combination of some or all of the following devices: printer, scanner, photocopier, fax or e-mail.Google Scholar
- [2]BERR 2008 Information Security Breaches Survey, PricewaterhouseCoopers, United Kingdom, April 2008, available at www.security-survey.gov.uk (last visited on 22 April 2008).Google Scholar
- [3]Is managed print service right for your office?, Ken Weilerstein, 16 December 2005.Google Scholar
- [4]User survey: managed print services, Europe, 2005 (executive summary), Cecile Drew, Malcolm Hancock, Gartner, 2 September 2005.Google Scholar
- [5]What IT asset managers need to know about managing office print before it falls into their lap, Ken Weilerstein, Gartner, 11 November 2005; Secure printing solutions best practice — key concept, value add security advice for your organisation, Hewlett-Packard, 2005.Google Scholar
- [6]Quarterly statistics: state of the printer, copier and MFP market, EMEA, 2Q07, Sharon McNee, Cecile Drew, Tosh Prabhakar, Gartner, 10 September 2007.Google Scholar
- [7]http://www.iso.org/iso/support/faqs/faqs_widely_used_standards/widely_used_standards_other/information_security.htm (last visited on 4 April 2008).
- [8]https://www.pcisecuritystandards.org/tech/index.htm (last visited on 14 April 2008).Google Scholar
- [9]The PCI standard and its implications for the security industry, Mathieu Gorge, VigiTrust, Computer Fraud & Security, February 2006.Google Scholar
- [10]COBIT 4.1 Excerpt — Executive summary framework, http://www.isaca.org/AMTemplate.cfm?Section=Downloads&Template=/ContentManagement/ContentDisplay. cfm&ContentID=34172 (last visited on 4 April 2008).
- [11]COBIT 4.1, IT Governance Institute, USA, 2007.Google Scholar
- [12]Secure printing solutions best practice — key concept, value add security advice for your organisation, Hewlett-Packard, 2005.Google Scholar
- [13]Small office/home office LANs face network access security challenges, John Girard, Gartner, 6 July 2005.Google Scholar
- [14]COBIT 4.1, IT Governance Institute, USA, 2007.Google Scholar
- [15]Managing an Information Security and Privacy Awareness and Training Program, Rebecca Herold, USA, 2005.Google Scholar
- [16]A Users’ Guide: How to raise Information Security Awareness, ENISA, June 2006, available at http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf
- [17]Eliminate banner pages and save up to 20 % in printing consumables, Federico De Silva Leon, Charles Smulders, Ken Weilerstein, Gartner, 10 October 2007.Google Scholar
- [18]Q&A for overcoming obstacles in managing office printing, Ken Weilerstein, Gartner, 28 March 2008.Google Scholar
Copyright information
© Vieweg+Teubner | GWV Fachverlage GmbH 2008