The Dark Side Of Remote Printing? - InformationWeek
IoT
IoT
Government // Mobile & Wireless
Commentary
1/27/2011
11:34 AM
Lamont Wood
Lamont Wood
Commentary
50%
50%

The Dark Side Of Remote Printing?

Having a printer that can reach out to the Web means having a printer that a hacker can reach out to. Should SMBs lose sleep over this?

Having a printer that can reach out to the Web means having a printer that a hacker can reach out to. Should SMBs lose sleep over this?There are reports of hackers using the new remote printing facilities like ePrint to penetrate office LANS. They do three different things.

First, they get access to the printer and use it to penetrate the office network, looking for passwords and files.

The second is that hackers can take control over the printers, pool their resources, and create storage networks. (This would appear to constitute a nuisance rather than a danger.)

Thirdly, multi-function printers can be rigged to purloin images of any documents that were left on the scanner, taking advantage of their scanner's remote control feature.

Surely the answer to the third problem is implement any available security on the printer, and don't leave documents on the scanner bed.

The answer for the first two is a little iffier. Remote printing is new technology and the kinks have not been ironed out yet, and this apparently includes the security. We may have to hearken back to the early days of PC security, when the first and best advice was to turn off the machines when not in use.

With the ePrint machine I have tried, an HP Officejet Pro 8500A, the main security measure seemed to be the use of a randomized e-mail address to suppress incoming spam. And after two months I can say that no spam has arrived.

Also, it continues to work fine with Hotmail, but not at all with Microsoft Outlook 2007, despite official compatibility.

So I assume hackers would have an equal amount of trouble.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll