SlideShare a Scribd company logo
1 of 12
Download to read offline
Identifying and securing areas of the
business you may have never considered a
security risk
On 12 March reforms to the Federal
Government’s privacy legislation came into
effect.
New privacy laws are now in effect.
The penalties and risks that businesses may
be liable:
The Federal Government is making
organisations more accountable for
protecting data, with the power to impose
fines of up to $340,000 for individuals and
$1.7 million for companies that fail to take
reasonable steps.
.
Protecting confidential documents is more
critical in business today than ever before.
What has changed?
For more information visit www.oaic.gov.au
Are people concerned about their privacy?
For more information visit www.oaic.gov.au
60% have decided not to deal with
an organisation because of concerns about
privacy.
Source: Office of the Australian Information Commissioner’s (OAIC)
2013 Community Attitudes to Privacy survey
33% of Australians reported that
they had a problem with how their personal
information was handled in the previous 12
months.
Source: Office of the Australian Information Commissioner’s (OAIC)
2013 Community Attitudes to Privacy survey
Source: Woolcott Research “Document & Data Security”
94%
0% 20% 40% 60% 80% 100%
59%
0% 20% 40% 60% 80% 100%
23%
0% 20% 40% 60% 80% 100%
Document Security – level of Risk Awareness
Document Security – level of Risk Concern
Printer Security – level of Risk Concern
Level of awareness vs risk in a business
What about multifunction printers?
An MFP is a powerful business asset, but left
unsecured, MFPs and networked printers
remain a critical source of vulnerability.
Potential Security Threats
Unclaimed Output tray
Unauthorised access to the
printer or MFP with no trace
Unauthorised changes to
settings to gain access.
Hardware Theft
Network sniffing – data from PC
and printer
Store thousands of scanned images
Accidental data breaches through printing
Are you at risk?
Quocrica, “Printing: a false sense of security”.
What can you do?
7 steps you can take to help keep your multifunction
printer data secure from potential risk.

More Related Content

What's hot

Data Breaches
Data BreachesData Breaches
Data Breaches
sstose
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
John Davis
 

What's hot (20)

An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
 
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaper
 
The effect of io t new features on security
The effect of io t new features on securityThe effect of io t new features on security
The effect of io t new features on security
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Can we keep your data please?
Can we keep your data please?Can we keep your data please?
Can we keep your data please?
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 

Similar to Identifying and securing areas of the business you may have never considered a security risk

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
Adriana Sanford
 

Similar to Identifying and securing areas of the business you may have never considered a security risk (20)

Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

More from Konica Minolta

More from Konica Minolta (8)

Konica minolta2014budget slideshow_20140612
Konica minolta2014budget slideshow_20140612Konica minolta2014budget slideshow_20140612
Konica minolta2014budget slideshow_20140612
 
Discover the benefits of web to print - EFI, Konica Minolta
Discover the benefits of web to print - EFI, Konica MinoltaDiscover the benefits of web to print - EFI, Konica Minolta
Discover the benefits of web to print - EFI, Konica Minolta
 
Benefits of toner based wide format printing - Anitech, Konica Minolta
Benefits of toner based wide format printing - Anitech, Konica MinoltaBenefits of toner based wide format printing - Anitech, Konica Minolta
Benefits of toner based wide format printing - Anitech, Konica Minolta
 
Intro to the Adobe Creative Cloud - Adobe, Konica Minolta
Intro to the Adobe Creative Cloud - Adobe, Konica MinoltaIntro to the Adobe Creative Cloud - Adobe, Konica Minolta
Intro to the Adobe Creative Cloud - Adobe, Konica Minolta
 
Finishing options for professional printing from Morgana, Konica Minolta
Finishing options for professional printing from Morgana, Konica MinoltaFinishing options for professional printing from Morgana, Konica Minolta
Finishing options for professional printing from Morgana, Konica Minolta
 
How variable data can grow your business - Konica Minolta, Objectif Lune
How variable data can grow your business - Konica Minolta, Objectif LuneHow variable data can grow your business - Konica Minolta, Objectif Lune
How variable data can grow your business - Konica Minolta, Objectif Lune
 
Opportunities for the environmentally responsible organisation | Infographic
Opportunities for the environmentally responsible organisation | InfographicOpportunities for the environmentally responsible organisation | Infographic
Opportunities for the environmentally responsible organisation | Infographic
 
Konica Minolta Corporate Profile 2012
Konica Minolta Corporate Profile 2012Konica Minolta Corporate Profile 2012
Konica Minolta Corporate Profile 2012
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Identifying and securing areas of the business you may have never considered a security risk

  • 1. Identifying and securing areas of the business you may have never considered a security risk
  • 2. On 12 March reforms to the Federal Government’s privacy legislation came into effect. New privacy laws are now in effect.
  • 3. The penalties and risks that businesses may be liable: The Federal Government is making organisations more accountable for protecting data, with the power to impose fines of up to $340,000 for individuals and $1.7 million for companies that fail to take reasonable steps. .
  • 4. Protecting confidential documents is more critical in business today than ever before. What has changed? For more information visit www.oaic.gov.au
  • 5. Are people concerned about their privacy? For more information visit www.oaic.gov.au
  • 6. 60% have decided not to deal with an organisation because of concerns about privacy. Source: Office of the Australian Information Commissioner’s (OAIC) 2013 Community Attitudes to Privacy survey
  • 7. 33% of Australians reported that they had a problem with how their personal information was handled in the previous 12 months. Source: Office of the Australian Information Commissioner’s (OAIC) 2013 Community Attitudes to Privacy survey
  • 8. Source: Woolcott Research “Document & Data Security” 94% 0% 20% 40% 60% 80% 100% 59% 0% 20% 40% 60% 80% 100% 23% 0% 20% 40% 60% 80% 100% Document Security – level of Risk Awareness Document Security – level of Risk Concern Printer Security – level of Risk Concern Level of awareness vs risk in a business
  • 9. What about multifunction printers? An MFP is a powerful business asset, but left unsecured, MFPs and networked printers remain a critical source of vulnerability.
  • 10. Potential Security Threats Unclaimed Output tray Unauthorised access to the printer or MFP with no trace Unauthorised changes to settings to gain access. Hardware Theft Network sniffing – data from PC and printer Store thousands of scanned images
  • 11. Accidental data breaches through printing Are you at risk? Quocrica, “Printing: a false sense of security”.
  • 12. What can you do? 7 steps you can take to help keep your multifunction printer data secure from potential risk.