
Cyber Secure Return to the Office
Security in the work environment is always critical – perhaps now more than ever. As employees begin returning to the office, revisiting basic cybersecurity practices is encouraged and cannot be overlooked. In addition to consulting with your own information and cyber security teams, there are several best practices we recommend reviewing.
ACCESS CONTROLS
Review and revise employees access controls to networked devices as necessary (reflect any changes to roles, responsibilities, etc.)
LOGINS
Update old login credentials (administrator, community strings, etc.) according to your company policies or follow guidelines for password complexity.
NETWORK CONFIGURATIONS
Make sure only necessary devices are connected and securely configured (image overwrite enabled, authentication required, disable unused ports, etc.)
SOFTWARE LEVELS
Ensure you have the latest security related software releases/patches installed on your multifunction devices or printers.
Print Security for Home Office
While not everyone is returning to the office, home office can be a safe haven. Security should still be top of mind. Here are a few security tips for the home office:
WIFI SAFETY
ensure home/remote network is using secure authentication for your router or (WPA2 or later)
SOFTWARE UPDATES
Keep printer software up to date. Use auto software update when possible.
UNIQUE PASSWORDS
Set a unique local printer administrative password to prevent accidental re-configuration or snooping.
BE PROACTIVE vs REACTIVE
Xerox’s Quick Start Guide To Print Security: Download PDF
Here are more additional Helpful Security Tips
of organizations have had a print breach1
of all breaches are carried out within minutes2
What We Provide
We provide Managed Information Technology Services, Document Management, and Print Solutions. We offer free consultations to ensure you are maximizing your productivity workflow and network security. Our Specialists can put together a strategic plan that is impactful and cost-effective. Altek can analyze your current infrastructure and office technology to create a plan that aligns with your company’s needs while staying within a monthly budget.
You’re still scrolling?
We know, it’s a lot of information! Allow us to help you make an informed decision.
References: Xerox™
https://security.business.xerox.com/news/guidance-on-a-cybersecure-and-safe-return-to-the-office/
https://security.business.xerox.com/news/make-your-xerox-device-more-secure-helpful-tips/
https://www.xerox.com/en-us/office/insights/printer-security
1. 2010 “Annual Study: US Cost of a Data Breach.” The Ponemon Institute, LLC, March 2011
2. Verizon 2015 data breach investigations report