• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • As we quickly transition into a new year, I think back on 2017 and the rash of cyber security stories that made national and international news. Ransomware like WannaCry and NotPetya, the Equifax breach, SMBv1 and SSL vulnerabilities, etc. Even a global phishing scam used a fake Konica Minolta C224e scan to email message as bait.

    Most noteworthy in the printer industry were the major campaigns launched by various MFP and print providers. As it turned out, one of the most prolific printer security campaigns actually backfired when it was discovered that the very printer vulnerabilities described in the campaign were actually discovered on their own portfolio of enterprise printers. You couldn’t make it up if you tried. (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Blog-bizhubSecureYou may have heard about recent reports of network hackers gaining access to multifunction printers, causing headaches for IT and cyber security personnel. These stories in the news are creating a lot of noise in the industry, overstating the risks of having a printer or MFP installed within an organization’s network. Although the vulnerabilities could be a cause for concern, multifunction printer hacks are relatively harmless, causing incidents such as an MFP to “lock up” using denial of service and brute force attacks. This type of action would require an exceptional, concerted effort by a person within the firewall of an organization to attack a specific multifunction printer. Typically, a person who wanted to do cyber harm within a corporation wouldn’t spend this type of effort to attack a printing device.

    It is important to understand that these perceived network vulnerabilities can only be taken advantage of from within a company’s network environment. This means that the network hacker would need to be a company or organizational employee with private network access. The devices are not vulnerable from outside the firewall or from the Internet – unless the network is vulnerable to external attacks. If that is the case, the multifunction printer should be the least of an organization’s worries. Obviously, the first course of action must always be to secure the network.

    (more…)

    From Our Experts, Security

    , , , , , , , ,

    Creating efficiency for Legal customers

    , Director, Business Development

    legal

    We’ve always created solutions targeted to distinct customer segments. From graphic communications to healthcare and education, our portfolios give our customers specifically designed products and services that uniquely meet their needs.

    Nowhere is this philosophy more customized than in the Legal industry. Together with our hardware technology, our legal clients also get best-in-class software, services and solutions via Konica Minolta Business Solutions and our All Covered IT Services subsidiary.

    (more…)

    Customer Experience, From Our Experts, Marketing, Solutions, Strategy, Technology

    , , , ,

    Making Security a Non-Issue

    , Product Marketing Manager

    Protecting sensitive electronic information is of greater concern than ever before.  For those in industries such as legal or healthcare, the need to protect information from unauthorized access is even more critical given the demands of both governmental and organizational security regulations.   And while most of us are aware of the need to protect our intranets, electronic file databases, email systems, etc., not all of us are aware of the need to also protect our peripheral devices from potential security risks.

    At the simplest level, many organizations have shared printers that allow employees to print from their desk and retrieve their printed materials from the device.  This often entails weeding through a pile of print outs and allowing others to view – or even take – sensitive information.  In addition, media continue to cast light on the subject of whether peripheral devices save printed/scanned/copied materials on a hard drive that can later be accessed.

    So how can you make certain your valuable data is safe from these threats? (more…)

    Customer Experience, From Our Experts, Security, Technology

    , , , , , , , ,