SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Quocirca report - Secure printing: The foundation of multi-layered security

13 Oct 2023

Quocirca report - Secure printing: The foundation of multi-layered security
Contact company
Contact ELATEC GmbH
icon Add as a preferred source Download PDF version
Related Links
  • GSX highlights PKOC demonstration: eight companies featured in a compelling interoperability demonstration
  • Zenitel leapfrogs into mixed-use building communication solutions with two new products
  • How can security technologies protect lone workers?

The hybrid work environment has expanded the exploitable attack surface, and multiple layers of security are required to protect it from external and internal threats. Implementing secure print solutions is an easy way to ensure neither network data nor printed documents fall into the wrong hands. RFID readers and mobile authentication technology solutions help organisations implement secure print policies and seamlessly enable user authentication across multiple identification platforms.

Businesses of all sizes are facing a rising tsunami of cybersecurity risks. In the cloud- and AI-driven hybrid work era, the threat landscape is complex and constantly evolving, with new, more sophisticated cyber threats emerging daily–whether these involve malware, phishing, or ransomware attacks. Meanwhile, security teams are dealing with a whole new raft of security threats, misconfigured access points, weak passwords, lack of identity and access management (IAM), and failure to use multi-factor authentication.

Quocirca’s 2023 report

The most common threat is from insiders–with the majority of data breaches caused by human error

Quocirca’s Print Security Landscape, 2023 report reveals that the volume of overall security incidents has increased in the past year for 61% of organisations, rising to 70% in the US and 66% in business and professional services organisations. Yet, just 38% of organisations use a secure print solution (such as pull-printing) to ensure documents are only released to authorised users. 

The impact of a data breach can be severe, if not catastrophic. With endpoints representing the most common attack vector and cyber-attacks continuing to grow in sophistication, organisations are finding it harder to detect and defend against cybersecurity threats. Meanwhile, the most common threat is from insiders–with the majority of data breaches caused by human error.

Print security is non-negotiable

Smart MFPs have several points of vulnerability–in addition to the printed output that can fall into the wrong hands without the right controls, devices can be attacked and become access points to the wider network.  However, for many organisations, securing a diverse printer fleet that may include multiple brands, legacy devices, and a patchwork of software and drivers can be challenging. The risk is exacerbated in distributed hybrid work environments, where MFPs are shared among more users, sometimes in settings that involve more than one company or are away from standard controllable locations, such as in an employee’s home.

Meanwhile, a multi-vendor environment may not incorporate consistent security controls, and a fragmented approach to cloud printing may create further security risks around access and authentication. Similarly, organisations may already have access token systems in place and be unwilling to burden employees with additional cards.

The insider threat and data protection

The risk of employee error or insider threat is frequently overlooked, even though it is statistically

Awareness of the importance of data protection has never been higher, thanks to vigorous public information campaigns around privacy legislation such as the GDPR and CCPA. However, businesses often focus disproportionately on mitigating external malicious threats. The risk of employee error or insider threat is frequently overlooked, even though it is statistically much more likely, hence the relatively low proportion of organisations that have implemented secure printing.

Many organisations still need to be educated on the print-related data breach risk and encouraged to address it through user-friendly secure printing solutions. Spearheading a programme for education and awareness of the solutions that can help businesses mitigate print-related data breach risk is an important role and opportunity for suppliers.

Remote workers

Home printers, particularly those that were purchased by employees, may not meet corporate security standards or be monitored through centralised security tools. Remote workers may be accessing data from unsecured home or public Wi-Fi networks.

Yet, print security remains low on the agenda compared to top priorities such as cloud and email. This lack of priority– or complacency–is leaving businesses vulnerable given that paper is one of the least secure mediums in the workplace. While device attacks are rare, the likelihood of paper documents being accessed by unauthorised recipients is increasingly prevalent.

Quocirca’s research

Complexity of securing the print infrastructure is putting more pressure on already-firm IT teams

Quocirca’s research revealed that, on average, 27% of IT security incidents relate to paper documents, and overall, 61% of organisations have experienced a paper-related data breach. This has led to an average print data breach cost of $970,000–the financial consequences of a data breach can be severe for businesses of any size.

The complexity of securing the print infrastructure is putting more pressure on already-stretched IT teams. According to Quocirca’s research, 39% of IT decision-makers believe print security has become harder to manage. It is, therefore, perhaps unsurprising that just 19% of ITDMs are completely confident that their print infrastructure is protected from security breaches and data losses. This drops to just 11% among SMBs.

Mitigating the risk with multi-layered print security

Fortunately, these risks can be mitigated in simple and effective ways. Secure printing is a key element of a broader multi-layered, integrated approach to print security. Quocirca’s Print Security Maturity Index reveals that organisations classed as security providers (defined as those that have implemented a range of measures, including security assessments, pull-printing, and formal print security policies) are seeing lower levels of data loss and have higher confidence in the security of their print infrastructure.

Advanced secure printing solutions ensure that documents are only released to authorised users, when the user authenticates at the device via RFID card, smartphone mobile credential, or biometrics. This allows organisations to ensure employees have a consistent way of releasing documents across distributed environments and overcome some of the inherent risks associated with using basic PINs or weak password credentials alone. With just 38% of organisations reporting that they have implemented secure printing, advanced secure printing solutions based on RFID technology offer a clear opportunity to mitigate the growing risk of print-related data breaches.

Security and convenience with ELATEC RFID readers

Readers integrate with pioneering MFP brands and print software, allowing employees to authenticate

ELATEC, a provider of universal RFID, NFC, and Bluetooth® Low Energy (BLE) readers, is well established in the print security market. Its RFID readers offer convenient user authentication and access control across a wide range of locations, equipment, and systems. The readers integrate with pioneering MFP brands and print software, allowing employees to authenticate at devices with the same RFID cards they use to enter the building, which eliminates the need for new systems. This overcomes the risks associated with using passwords or PINs to release print jobs. The card can also be implemented as part of many existing smartphone apps.

With RFID card and smartphone credentialing systems, users simply wave their ID card or smartphone over the reader to release the print job. The reader connects with the print management software system to authenticate and match the user with the print jobs they sent. All of this is recorded in case a forensic investigation around information loss is required. Usage and volume of consumables used can also be monitored and tracked for chargeback purposes.

Different security approaches

Such an identity management platform is extensible. For example, ELATEC supports mobile credentials and access solutions that can be integrated into existing secure identity systems. Examples include building information management (BIM) systems, for unlocking doors or clocking into a building, as well as single sign-on (SSO) systems for logging onto a computer network or accessing applications. The solutions leverage standard device technologies and are universally accessible, easy to deploy, and simple to manage.

Solutions leverage standard device technologies and are universally accessible, easy to deploy

Further security capabilities involve the location of the user and printer. For example, if a user is logged as being in one part of a building and trying to free up a print job in another, the system can flag this as a likely problem and put a hold on the print job until the issue between location and action can be resolved. Different security approaches can be applied based on location–for example, an employee may be able to print a document while in the office, but not when at home or in a public environment. Certain documents may only be printable in a secure print room, which enables much greater control over what information is made available, even within the organisation.

RFID approach

As such, an RFID approach can enable a well-rounded security strategy, blending in location, time, user credentials, application access, and information type, while bringing together all aspects of security that an organisation needs–not just at a simplistic IT level. For example, even if a malicious actor gains entry to an IT environment, using RFID tokens integrated into SSO systems and protecting information flows and print job processes prevent them from accessing important information.

As an extra layer of security, the RFID signal can be encrypted, making the solution much more secure than a password or PIN system. The transponder signal cannot be easily cloned or hacked, and employees are much less likely to share their corporate ID card or phone than a printer password or PIN. Even when a card is mislaid or stolen, it can be easily deleted from the access database, and the physical card will be inactive.

Privacy and regulation compliance

According to the UN Conference on Trade & Development, 71% of countries worldwide have data protection and/or privacy regulations in place. Many of those that do not are in the process of implementing them. In the US, individual states have enacted their own privacy regulations. While the detail varies between jurisdictions, fundamental privacy regulations make businesses liable for protecting the data they collect, manage, and share.

Failure to enough protect data across the digital and physical print network can result in heavy finesThe print network represents a major channel for sharing and managing data. Therefore, implementing a secure printing solution should be viewed as a fundamental step to ensure compliance with data protection regulations. Failure to adequately protect data across the digital and physical print network can result in heavy fines, legal action, and reputational damage that, in the most severe cases, can affect the business’s survival.

The path forward

The threat landscape is set to become more complex, with advanced cyber attacks likely to result in far-reaching financial and business impacts. Therefore, ensuring resilient and secure print infrastructure as part of the overall IT and business information environment, while supporting efficiency, is a business imperative.

Printing remains a key element of the IT infrastructure, and organisations must treat print security as any other endpoint on the network. RFID access control and mobile authentication will enable IT teams to balance security with productivity in an evolving hybrid workplace.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Remote security
  • Radio frequency Identification
  • Identity management
  • Wireless security
  • Network cameras
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Security Assessments
  • Artificial intelligence (AI)
  • Mobile access
  • GDPR
  • Related categories
  • Bollards
  • Power supplies & batteries
  • Barricades
  • Gates
  • Barriers
  • Storage
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
About this page

"Secure your network data and printed documents with our RFID and mobile authentication technology. Protect your business against cyber threats with our efficient, user-friendly secure printing solutions."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec