Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical. As we are all connected to the Internet,
we all can become a victim of cyber-attacks.
So, what can you do to better protect your business and secure your internal data?
2. Protecting the Value of Your Business 2
Suffice it to say that this information can
encompass almost anything, including
manufacturing and business processes,
business plans, presentations, financial
data, market intelligence, customer, supplier
and pricing information, new innovative
ideas, methods and technologies, to mention
some of the most common forms.
Today’s online world brings
new challenges to businesses,
making the security of your
businesses’ internal information
extremely critical.
market intelligence
PRICING
information
technologies
DATA
DATA
D
ATA
DATA
DATA
3. 3Protecting the Value of Your Business
According to the State of Risk Report,
surveyed in late 2014, 476 of IT
professionals questioned had no
or only a partial system in place
for securing internal data.
4. 4Protecting the Value of Your Business
That included customer names, addresses,
phone numbers and email contact information.
This has been recorded as the biggest cyber-
attack in corporate history.
That same year, financial
heavy-hitter, J.P. Morgan
revealed that a cyber-attack
over the summer may have
compromised information of
about 76 million households.
5. Protecting the Value of Your Business 5
As we are all connected to the Internet,
we all can become a victim of cyber-attacks.
So, what can you do to better protect your
business and secure your internal data?
6. 6Protecting the Value of Your Business
Document and Data Storage
Organisations have documents processed
on a daily basis - regardless if they operate
on a paperless system or not. Though some
may process transactions without ever
printing copies - 15% of an organisation’s
revenue is spent creating, managing and
distributing documentation.
1
15%of revenue is spent creating,
managing and distributing
documentation*
* Fuji Xerox 2016 Whitepaper, "Give Your Customer A Voice"
7. 7Protecting the Value of Your Business
1
60% of employee time is spent working with
documents, receipts, purchase orders, and
legal documents which also require paper
back ups for filing purposes. As required by
law, these documents are kept in a secured
storage areas for a number of years.
8. 8Protecting the Value of Your Business
Enable user restrictions on
who can access, share, or print
documents existing in shared
folders. Document rights
management and secured
folders mean key repositories
can be shared safely.
Centralised user and device
management information
are backed up regularly,
facilitating prompt restoration
of settings when required.
Redundancy systems should be
in place so that in the event
of a calamity, service will not
be interrupted.
Where your data is stored is as equally
important as who has back-end access
to it. Consider the following:
Where is your data physically stored? Who monitors and
controls the hardware and software? Is your service provider
dedicated to improving its management processes and
safeguarding against security attacks?
Practical Tips
In the event of a calamity, will service be interrupted? What
is your data recovery plan? Check how highly your provider’s
data centre facility is rated.
For those in fast-paced workplaces, information security isn’t
an issue until it suddenly is. The truth is, any employee has
the opportunity to release confidential data - sharing it with
competitors, vendors or the media.
9. Protecting the Value of Your Business 9
Cloud Computing
The more accessible information
becomes, the more important it is
to protect it. Where your data is
stored and who has back-end access
to it, is just as important as what
happens to it when it travels.
Placing your organisation on the
cloud makes it agile and responsive,
which are crucial qualities in
a dynamic world.
2
10. Protecting the Value of Your Business 10
A 2015 study revealed cyber attacks on
cloud deployments have increased by 45%,
with more than 800,000 security incidents
estimated over the course of just one year.*
Introduce mobile security
measures that enables
employees to print securely
from any device without
installing a print driver.
Get a better view
on who can access what,
from where, and how
by employing user
authentication protocol.
Integrate a cloud solution
so employess can access
documents on the go
and print them
using wireless printing.
Practical Tips
*www.technewsworld.com
11. 11Protecting the Value of Your Business
Mobile Devices
Smartphones and tablets have become as
essential to businesses, allowing employees
to access company data remotely. Increased
opportunity often comes with increased risk,
and these same mobile devices are quickly
becoming the leading cause of breaches
in organisations, costing millions of dollars
in possible loss.
A new study by the Ponemon Institute
speaks to employee’s mobile devices as
being one of the root causes of many
of today’s data breaches.
3
12. 12Protecting the Value of your Business
“Of the 1028 IT and IT security professionals
surveyed who are employed in 2000 companies
world-wide, 67% say they it is certain their
organisation had a data breach as a result of
employees using their mobile devices to access their
company’s sensitive and confidential information
from remote locations.”
3
13. 13Protecting the Value of your Business
Employees are dragging companies into the tech era – it’s
not out of ordinary to work remotely and depend on your
mobile device as the only means to connect. Organisations
aren’t aligned with this notion and therefore aren’t doing
enough to keep up with risks in and out of the workplace.
While they are valuable when it comes to conducting
business, mobile devices also pose security risks.
It only takes one infected device to cause
a great deal of internal corporate damage
and as technology advances so does the intrusive
software that’s running undetected.
Don’t underestimate how
much employees rely on mobile
devices. Focus on introducing
mobile security measures that
safely enable employees to print
securely from any device without
installing a print driver.
Implement safeguards to keep
corporate data secure such
as user authentication protocol
on mobile devices.
Review your mobile security
policy and get a better
handle on who can access what,
from where, and how. Ensure the
same print security settings are
employed consistently across all
devices - from desktop PC,
to tablet and smartphone.
Practical Tips
14. Protecting the Value of Your Business 14
Document Printing and Copying
An oversight on many security policies is the
use of printers, scanners, and copiers. Over the
years multifunctional printers have developed
additional features like scan-to-email
and cloud integration to enable users to scan
and print from cloud applications.
With the emergence of NFC-enabled
applications, it’s said that more than a
billion1
phones will have the capability to use
the wireless protocol to exchange data, and
applications beyond payments will become
common - potentially opening up new
verticals for attack.
1
iDate, http://seekingalpha.com/article/2477835-intel-is-a-mobile-payments-player-too
4
15. Protecting the Value of Your Business 15
Because the printers of today have their own
embedded servers, and many offer remote
access via cloud application, it’s important
that they are properly secured.
Give employee usernames and track
dates and times for each print job.
You can also set usage restrictions
for individual employees or user
groups. Not only does it enhance
traceability of jobs, it also presents
meaningful information on a
user-specified interface.
Encryption enables you to apply
protection directly to the data.
Even if the perimeter is breached,
you can be sure that your
information remains secure
by removing overwrites
and ensuring read-only
documentation when sharing.
By utilising a quota on print
output quantity, each user or
user group can be specified and
limited. Usage limits and status
can also be monitored regularly.
Practical Tips
16. 16Protecting the Value of Your Business
The scope for data leakage is
very wide, and not limited to just
web and mobile devices.
The cyber security
industry is growing as
you’re reading this but
being aware of the
threats, vulnerability
trends and the policies
and solutions available
is the first step
in prevention.
No matter how large or
small your company is,
you need to have a plan
to ensure the security of
your information assets.
Protecting your data
means protecting its
confidentiality, integrity,
and availability.
Having a robust security
policy means that
you’ve taken steps to
diminish the risk of
losing data in any one
of a variety of ways
previously mentioned.
The value of your
business is in its data –
protect it at all costs.
17. Protecting the Value of Your Business 17
Is your current risk and information
management strategy up to date
and does it allow you to effectively
navigate the complexities of reputation
management? Learn more about
document management with
Fuji Xerox Smart Work Gateway.
With the right document workflow in
place, your organization can move one
step closer to securing business success.
18. 18Protecting the Value of Your Business
Smart Work Gateway
Smart Work Gateway (SWG)
is a new way of working. It changes
how you manage your workplace
and helps you re-imagine your
operations and streamline your
communications, setting
a new benchmark in usability.
With SWG, you can boost flexibility, remove barriers, and
give yourself the freedom to organize how you wish to
work. Change how you plug in, sign on and connect to
your workplace from any location you choose. Free up your
time, be productive and spend your time on work that is
meaningful to you. Importantly, in today’s world, SWG
allows you to achieve this while adhering with compliance
and security policies. Simply put, it is an employee and
customer-centric approach to change
the environment you work in.
Contact Us: enquiries@fujixerox.com
Solution:
ApeosWare Management Suite, ApeosWare Image Log Management,
Card Authentication, DocuShare, DocuWorks, Digital Rights Management