SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Top 19 Predictions from
Cybersecurity Experts
Printer & Document Security in 2019
Bill DeStefanis
Director Product
Strategy –
Imaging, Nuance
Joseph Steinberg
CISSP, ISSAP, ISSMP,
CSSLP, Cybersecurity
& Emerging
Technologies Advisor
Stacy Leidwinger
VP of Product –
Imaging, Nuance
Tracey Mustacchio
Senior VP Product,
R&D, Marketing –
Imaging, Nuance
Anthony Vigliotti
Senior Director
Product Management
– Imaging, Nuance
Shahid Shah
CTO,
Citus Health, Inc.
Dan Lohrmann
Chief Security
Officer, Security
Mentor, Inc.
Shira Rubinoff
Cybersecurity Advisor,
Thought Leader,
Author & Influencer
Scott Schober
Cybersecurity
Expert & Author
of Hacked Again
Steven C. Morgan
Founder & Editor-in-
Chief, Cybercrime
Magazine
In 2019...
Hackers will zero in on
unprotected IoT devices
—including printers
1 “The Printers-of-Things will be under attack in 2019
as cybercriminals zero in on unprotected devices in
small to mid-sized businesses and large enterprises.”
Steven C. Morgan, Founder & Editor-in-Chief, Cybercrime Magazine
2 “Just over a month ago, a hacker successfully forced
50,000 printers to print a message asking people to
follow a YouTube account. All the hacker had to do was
use an automated printing tool and print to the first
50,000 printers discovered using a vulnerable-device
search system. Nothing of note has been done to prevent
similar future breaches—we will see more of them.”
Joseph Steinberg, Cybersecurity and Emerging Technologies Advisor
3 “Cybercrime damages are predicted to cost the world
$6 trillion annually by 2021, up from $3 trillion in 2015.
The cost of cyberattacks on organizations of all types
and sizes will continue rising in 2019.”
Steven C. Morgan, Founder & Editor-in-Chief, Cybercrime Magazine
In 2019...
Printers will become
increasingly smart
and interconnected
4 “Consumers are becoming used to interacting with
items like TVs, speakers, refrigerators, and door bells
through companion apps. As IoT expands to workplace
MFPs and printers, workers will expect a unified
and simple experience across their line of business
applications and office hardware.”
Anthony Vigliotti, Senior Director Product Management – Imaging, Nuance
5 “With the growth of AI and Machine Learning, we
will have higher expectations of our print management
solutions. We will want the system to remember our
preferences, learn our habits (like what we print most),
and make recommendations such as what we should
store digitally in a CMS vs. print altogether.”
Stacy Leidwinger, Vice President of Product – Imaging, Nuance
In 2019...
Companies will be
forced to recognize
printer security risks
6 “We will finally start to see printers being treated as
untrusted IoT and hackable embedded devices. They
will no longer be seen as ‘safe desktop companions’
or ‘privileged network devices’ like they are now.”
Shahid Shah, CTO, Citus Health, Inc.
7 “Printers will be further targeted by cybercriminals in
what I am calling DDoP (Distributed Denial of Printing).
The attacks will be widespread where all internet
connected printers, wired or wireless, will be attacked
and flooded with traffic data rendering them useless
to employees—creating general workflow disruption.”
Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
8 “More old vulnerabilities will cause new problems
for IoT devices—including printers and scanners.
Just as this 10-year-old flaw was discovered in 2018,
get ready for more old problems to become new in
2019. This pushes enterprises to take another look
at their patching strategies.”
Dan Lohrmann, Chief Security Officer, Security Mentor, Inc.
In 2019...
Document protection
will become a highly-
prioritized focus
9 “Data stored in printer and scanner caches will
become a popular repository for digital dumpster
divers and a haven for cybercriminals. They will be
able to steal anything that was ever printed, long
after it was shredded.”
Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
10 “Organizations that are already using various data
loss prevention (DLP) methods will look to extend
their protection capabilities to documents that are
being printed or scanned on MFPs and printers.”
Bill DeStefanis, Director Product Strategy – Imaging, Nuance
11 “State-sponsored hackers will initiate more focused
remote attacks to steal government documents
from unsecured network printers throughout the
U.S. government. This theft will include personal
information as well as IP (Intellectual Property).”
Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
In 2019...
Tougher regulations will
drive the need for better
print management
12 “Compliance will be the top driver for investment
in print management software as companies will
look for ways to automate processes in print and
document workflows.”
Stacy Leidwinger, Vice President of Product – Imaging, Nuance
13 “Printer security gaps will impact compliance.
HIPAA breaches can be caused by hidden malware
on printers. Once malware is installed onto printers,
the files meant to be printed will print (to remove
suspicion) but files can also be silently redirected
to hackers outside the network.”
Shahid Shah, CTO, Citus Health, Inc.
“Companies will need help accurately monitoring
and reporting on document movements to meet
increasingly stringent regulations. Automatically-
generated audit trails and alerts for abnormal
behavior will help reduce both the costs of
compliance audits and fines from failing audits.”
Stacy Leidwinger, Vice President of Product – Imaging, Nuance
14
In 2019...
BYOD demand will rise
along with printing from
unsecured devices
15 “As people become more accustomed to working
on their mobile phones, we will see an increase in
mobile usage for work. Employees will be printing,
manipulating layouts, and initiating workflows from
their mobile device instead of going to the MFP.”
Tracey Mustacchio, Senior VP Product, R&D, Marketing – Imaging, Nuance
“More malware will find its way to network-connected
printers from unsecured mobile devices, as individuals
will be working less at the MFP and more from their
phones and tablets.”
Stacy Leidwinger, Vice President of Product – Imaging, Nuance
16
In 2019...
Companies will use
automation & unification
to reduce human error
17 “Organizations understand that the weakest link
in the security chain is the human. The adoption
of cyber hygiene within an organization will become
more prevalent because the strategy of making the
employee part of the solution, not the problem, will
yield a cyber-secure environment.”
Shira Rubinoff, Cybersecurity Advisor, Thought Leader, Author & Influencer
18 “The best way to combat security risks that come
along with print is to automate print processes
and build policies that reduce human error. More
companies will add automation to their print
management.”
Stacy Leidwinger, Vice President of Product – Imaging, Nuance
“We’ll continue to see a unification of disparate
business systems, including printers and MFPs,
where the underlying systems still exist with common
usage of data, IT infrastructure, and user experiences.”
Anthony Vigliotti, Senior Director Product Management – Imaging, Nuance
19
In 2019...
Hackers will zero in on unprotected IoT devices—including printers
Printers will become increasingly smart and interconnected
Companies will be forced to recognize printer security risks
Document protection will become a highly-prioritized focus
Tougher regulations will drive the need for better print management
BYOD demand will rise along with printing from unsecured devices
Companies will use automation & unification to reduce human error
Learn about the gaps in your print security:
nuance.com/DocumentsAreDangerous

Weitere ähnliche Inhalte

Was ist angesagt?

Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 

Was ist angesagt? (20)

NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 

Ähnlich wie 2019 Cybersecurity Predictions

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 

Ähnlich wie 2019 Cybersecurity Predictions (20)

Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
2018 Technology Trends in Business: The Experts Have Spoken
2018 Technology Trends in Business: The Experts Have Spoken 2018 Technology Trends in Business: The Experts Have Spoken
2018 Technology Trends in Business: The Experts Have Spoken
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
AI Predictions 2017
AI Predictions 2017AI Predictions 2017
AI Predictions 2017
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

2019 Cybersecurity Predictions

  • 1. Top 19 Predictions from Cybersecurity Experts Printer & Document Security in 2019
  • 2. Bill DeStefanis Director Product Strategy – Imaging, Nuance Joseph Steinberg CISSP, ISSAP, ISSMP, CSSLP, Cybersecurity & Emerging Technologies Advisor Stacy Leidwinger VP of Product – Imaging, Nuance Tracey Mustacchio Senior VP Product, R&D, Marketing – Imaging, Nuance Anthony Vigliotti Senior Director Product Management – Imaging, Nuance Shahid Shah CTO, Citus Health, Inc. Dan Lohrmann Chief Security Officer, Security Mentor, Inc. Shira Rubinoff Cybersecurity Advisor, Thought Leader, Author & Influencer Scott Schober Cybersecurity Expert & Author of Hacked Again Steven C. Morgan Founder & Editor-in- Chief, Cybercrime Magazine
  • 3. In 2019... Hackers will zero in on unprotected IoT devices —including printers
  • 4. 1 “The Printers-of-Things will be under attack in 2019 as cybercriminals zero in on unprotected devices in small to mid-sized businesses and large enterprises.” Steven C. Morgan, Founder & Editor-in-Chief, Cybercrime Magazine
  • 5. 2 “Just over a month ago, a hacker successfully forced 50,000 printers to print a message asking people to follow a YouTube account. All the hacker had to do was use an automated printing tool and print to the first 50,000 printers discovered using a vulnerable-device search system. Nothing of note has been done to prevent similar future breaches—we will see more of them.” Joseph Steinberg, Cybersecurity and Emerging Technologies Advisor
  • 6. 3 “Cybercrime damages are predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. The cost of cyberattacks on organizations of all types and sizes will continue rising in 2019.” Steven C. Morgan, Founder & Editor-in-Chief, Cybercrime Magazine
  • 7. In 2019... Printers will become increasingly smart and interconnected
  • 8. 4 “Consumers are becoming used to interacting with items like TVs, speakers, refrigerators, and door bells through companion apps. As IoT expands to workplace MFPs and printers, workers will expect a unified and simple experience across their line of business applications and office hardware.” Anthony Vigliotti, Senior Director Product Management – Imaging, Nuance
  • 9. 5 “With the growth of AI and Machine Learning, we will have higher expectations of our print management solutions. We will want the system to remember our preferences, learn our habits (like what we print most), and make recommendations such as what we should store digitally in a CMS vs. print altogether.” Stacy Leidwinger, Vice President of Product – Imaging, Nuance
  • 10. In 2019... Companies will be forced to recognize printer security risks
  • 11. 6 “We will finally start to see printers being treated as untrusted IoT and hackable embedded devices. They will no longer be seen as ‘safe desktop companions’ or ‘privileged network devices’ like they are now.” Shahid Shah, CTO, Citus Health, Inc.
  • 12. 7 “Printers will be further targeted by cybercriminals in what I am calling DDoP (Distributed Denial of Printing). The attacks will be widespread where all internet connected printers, wired or wireless, will be attacked and flooded with traffic data rendering them useless to employees—creating general workflow disruption.” Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
  • 13. 8 “More old vulnerabilities will cause new problems for IoT devices—including printers and scanners. Just as this 10-year-old flaw was discovered in 2018, get ready for more old problems to become new in 2019. This pushes enterprises to take another look at their patching strategies.” Dan Lohrmann, Chief Security Officer, Security Mentor, Inc.
  • 14. In 2019... Document protection will become a highly- prioritized focus
  • 15. 9 “Data stored in printer and scanner caches will become a popular repository for digital dumpster divers and a haven for cybercriminals. They will be able to steal anything that was ever printed, long after it was shredded.” Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
  • 16. 10 “Organizations that are already using various data loss prevention (DLP) methods will look to extend their protection capabilities to documents that are being printed or scanned on MFPs and printers.” Bill DeStefanis, Director Product Strategy – Imaging, Nuance
  • 17. 11 “State-sponsored hackers will initiate more focused remote attacks to steal government documents from unsecured network printers throughout the U.S. government. This theft will include personal information as well as IP (Intellectual Property).” Scott Schober, Cybersecurity Expert & Author of ‘Hacked Again’
  • 18. In 2019... Tougher regulations will drive the need for better print management
  • 19. 12 “Compliance will be the top driver for investment in print management software as companies will look for ways to automate processes in print and document workflows.” Stacy Leidwinger, Vice President of Product – Imaging, Nuance
  • 20. 13 “Printer security gaps will impact compliance. HIPAA breaches can be caused by hidden malware on printers. Once malware is installed onto printers, the files meant to be printed will print (to remove suspicion) but files can also be silently redirected to hackers outside the network.” Shahid Shah, CTO, Citus Health, Inc.
  • 21. “Companies will need help accurately monitoring and reporting on document movements to meet increasingly stringent regulations. Automatically- generated audit trails and alerts for abnormal behavior will help reduce both the costs of compliance audits and fines from failing audits.” Stacy Leidwinger, Vice President of Product – Imaging, Nuance 14
  • 22. In 2019... BYOD demand will rise along with printing from unsecured devices
  • 23. 15 “As people become more accustomed to working on their mobile phones, we will see an increase in mobile usage for work. Employees will be printing, manipulating layouts, and initiating workflows from their mobile device instead of going to the MFP.” Tracey Mustacchio, Senior VP Product, R&D, Marketing – Imaging, Nuance
  • 24. “More malware will find its way to network-connected printers from unsecured mobile devices, as individuals will be working less at the MFP and more from their phones and tablets.” Stacy Leidwinger, Vice President of Product – Imaging, Nuance 16
  • 25. In 2019... Companies will use automation & unification to reduce human error
  • 26. 17 “Organizations understand that the weakest link in the security chain is the human. The adoption of cyber hygiene within an organization will become more prevalent because the strategy of making the employee part of the solution, not the problem, will yield a cyber-secure environment.” Shira Rubinoff, Cybersecurity Advisor, Thought Leader, Author & Influencer
  • 27. 18 “The best way to combat security risks that come along with print is to automate print processes and build policies that reduce human error. More companies will add automation to their print management.” Stacy Leidwinger, Vice President of Product – Imaging, Nuance
  • 28. “We’ll continue to see a unification of disparate business systems, including printers and MFPs, where the underlying systems still exist with common usage of data, IT infrastructure, and user experiences.” Anthony Vigliotti, Senior Director Product Management – Imaging, Nuance 19
  • 29. In 2019... Hackers will zero in on unprotected IoT devices—including printers Printers will become increasingly smart and interconnected Companies will be forced to recognize printer security risks Document protection will become a highly-prioritized focus Tougher regulations will drive the need for better print management BYOD demand will rise along with printing from unsecured devices Companies will use automation & unification to reduce human error
  • 30. Learn about the gaps in your print security: nuance.com/DocumentsAreDangerous