Historically printers have not been much of a consideration in most organizations’ cyber security strategies, but that is exactly what has made them an attractive attack vector for hackers. In the past, the basic assumption was that a secure firewall was the extent of what is necessary to keep printers secure, but that is no longer sufficient because “the bad guys” know that these are soft targets sitting on corporate networks.
Perhaps you have heard the term “Zero Trust” at some point over the last couple years. If so, hopefully it was in the context of cybersecurity and not as part of a couple’s therapy session. Even if you have heard the phrase…even if you understand the technical aspects of how to execute a Zero Trust network architecture…or perhaps because you already know just how difficult it is to actually migrate to such an environment…it remains light years from being the reality for most organizations.