SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check Out Our Special Report On Casino Security

Get it now!

Quocirca Report - Secure Printing: The Foundation Of Multi-Layered Security

13 Oct 2023

Quocirca Report - Secure Printing: The Foundation Of Multi-Layered Security
Contact company
Contact ELATEC GmbH
icon Add as a preferred source Download PDF version
Related Links
  • GSX Highlights PKOC Demonstration: Eight Companies Featured In A Compelling Interoperability Demonstration
  • Zenitel Leapfrogs Into Mixed-Use Building Communication Solutions With Two New Products
  • How Can Security Technologies Protect Lone Workers?

The hybrid work environment has expanded the exploitable attack surface, and multiple layers of security are required to protect it from external and internal threats. Implementing secure print solutions is an easy way to ensure neither network data nor printed documents fall into the wrong hands. RFID readers and mobile authentication technology solutions help organizations implement secure print policies and seamlessly enable user authentication across multiple identification platforms.

Businesses of all sizes are facing a rising tsunami of cybersecurity risks. In the cloud- and AI-driven hybrid work era, the threat landscape is complex and constantly evolving, with new, more sophisticated cyber threats emerging daily–whether these involve malware, phishing, or ransomware attacks. Meanwhile, security teams are dealing with a whole new raft of security threats, misconfigured access points, weak passwords, lack of identity and access management (IAM), and failure to use multi-factor authentication.

Quocirca’s 2023 report

The most common threat is from insiders–with the majority of data breaches caused by human error

Quocirca’s Print Security Landscape, 2023 report reveals that the volume of overall security incidents has increased in the past year for 61% of organizations, rising to 70% in the US and 66% in business and professional services organizations. Yet, just 38% of organizations use a secure print solution (such as pull-printing) to ensure documents are only released to authorized users. 

The impact of a data breach can be severe, if not catastrophic. With endpoints representing the most common attack vector and cyber-attacks continuing to grow in sophistication, organizations are finding it harder to detect and defend against cybersecurity threats. Meanwhile, the most common threat is from insiders–with the majority of data breaches caused by human error.

Print security is non-negotiable

Smart MFPs have several points of vulnerability–in addition to the printed output that can fall into the wrong hands without the right controls, devices can be attacked and become access points to the wider network.  However, for many organizations, securing a diverse printer fleet that may include multiple brands, legacy devices, and a patchwork of software and drivers can be challenging. The risk is exacerbated in distributed hybrid work environments, where MFPs are shared among more users, sometimes in settings that involve more than one company or are away from standard controllable locations, such as in an employee’s home.

Meanwhile, a multi-vendor environment may not incorporate consistent security controls, and a fragmented approach to cloud printing may create further security risks around access and authentication. Similarly, organizations may already have access token systems in place and be unwilling to burden employees with additional cards.

The Insider threat and data protection

The risk of employee error or insider threat is frequently overlooked, even though it is statistically

Awareness of the importance of data protection has never been higher, thanks to vigorous public information campaigns around privacy legislation such as the GDPR and CCPA. However, businesses often focus disproportionately on mitigating external malicious threats. The risk of employee error or insider threat is frequently overlooked, even though it is statistically much more likely, hence the relatively low proportion of organizations that have implemented secure printing.

Many organizations still need to be educated on the print-related data breach risk and encouraged to address it through user-friendly secure printing solutions. Spearheading a program for education and awareness of the solutions that can help businesses mitigate print-related data breach risk is an important role and opportunity for suppliers.

Remote workers

Home printers, particularly those that were purchased by employees, may not meet corporate security standards or be monitored through centralized security tools. Remote workers may be accessing data from unsecured home or public Wi-Fi networks.

Yet, print security remains low on the agenda compared to top priorities such as cloud and email. This lack of priority– or complacency–is leaving businesses vulnerable given that paper is one of the least secure mediums in the workplace. While device attacks are rare, the likelihood of paper documents being accessed by unauthorized recipients is increasingly prevalent.

Quocirca’s research

Complexity of securing the print infrastructure is putting more pressure on already-firm IT teams

Quocirca’s research revealed that, on average, 27% of IT security incidents relate to paper documents, and overall, 61% of organizations have experienced a paper-related data breach. This has led to an average print data breach cost of $970,000–the financial consequences of a data breach can be severe for businesses of any size.

The complexity of securing the print infrastructure is putting more pressure on already-stretched IT teams. According to Quocirca’s research, 39% of IT decision-makers believe print security has become harder to manage. It is, therefore, perhaps unsurprising that just 19% of ITDMs are completely confident that their print infrastructure is protected from security breaches and data losses. This drops to just 11% among SMBs.

Mitigating the risk with multi-layered print security

Fortunately, these risks can be mitigated in simple and effective ways. Secure printing is a key element of a broader multi-layered, integrated approach to print security. Quocirca’s Print Security Maturity Index reveals that organizations classed as security providers (defined as those that have implemented a range of measures, including security assessments, pull-printing, and formal print security policies) are seeing lower levels of data loss and have higher confidence in the security of their print infrastructure.

Advanced secure printing solutions ensure that documents are only released to authorized users, when the user authenticates at the device via RFID card, smartphone mobile credential, or biometrics. This allows organizations to ensure employees have a consistent way of releasing documents across distributed environments and overcome some of the inherent risks associated with using basic PINs or weak password credentials alone. With just 38% of organizations reporting that they have implemented secure printing, advanced secure printing solutions based on RFID technology offer a clear opportunity to mitigate the growing risk of print-related data breaches.

Security and convenience with ELATEC RFID readers

Readers integrate with pioneering MFP brands and print software, allowing employees to authenticate

ELATEC, a provider of universal RFID, NFC, and Bluetooth® Low Energy (BLE) readers, is well established in the print security market. Its RFID readers offer convenient user authentication and access control across a wide range of locations, equipment, and systems. The readers integrate with pioneering MFP brands and print software, allowing employees to authenticate at devices with the same RFID cards they use to enter the building, which eliminates the need for new systems. This overcomes the risks associated with using passwords or PINs to release print jobs. The card can also be implemented as part of many existing smartphone apps.

With RFID card and smartphone credentialing systems, users simply wave their ID card or smartphone over the reader to release the print job. The reader connects with the print management software system to authenticate and match the user with the print jobs they sent. All of this is recorded in case a forensic investigation around information loss is required. Usage and volume of consumables used can also be monitored and tracked for chargeback purposes.

Different security approaches

Such an identity management platform is extensible. For example, ELATEC supports mobile credentials and access solutions that can be integrated into existing secure identity systems. Examples include building information management (BIM) systems, for unlocking doors or clocking into a building, as well as single sign-on (SSO) systems for logging onto a computer network or accessing applications. The solutions leverage standard device technologies and are universally accessible, easy to deploy, and simple to manage.

Solutions leverage standard device technologies and are universally accessible, easy to deploy

Further security capabilities involve the location of the user and printer. For example, if a user is logged as being in one part of a building and trying to free up a print job in another, the system can flag this as a likely problem and put a hold on the print job until the issue between location and action can be resolved. Different security approaches can be applied based on location–for example, an employee may be able to print a document while in the office, but not when at home or in a public environment. Certain documents may only be printable in a secure print room, which enables much greater control over what information is made available, even within the organization.

RFID approach

As such, an RFID approach can enable a well-rounded security strategy, blending in location, time, user credentials, application access, and information type, while bringing together all aspects of security that an organization needs–not just at a simplistic IT level. For example, even if a malicious actor gains entry to an IT environment, using RFID tokens integrated into SSO systems and protecting information flows and print job processes prevent them from accessing important information.

As an extra layer of security, the RFID signal can be encrypted, making the solution much more secure than a password or PIN system. The transponder signal cannot be easily cloned or hacked, and employees are much less likely to share their corporate ID card or phone than a printer password or PIN. Even when a card is mislaid or stolen, it can be easily deleted from the access database, and the physical card will be inactive.

Privacy and regulation compliance

According to the UN Conference on Trade & Development, 71% of countries worldwide have data protection and/or privacy regulations in place. Many of those that do not are in the process of implementing them. In the US, individual states have enacted their own privacy regulations. While the detail varies between jurisdictions, fundamental privacy regulations make businesses liable for protecting the data they collect, manage, and share.

Failure to enough protect data across the digital and physical print network can result in heavy finesThe print network represents a major channel for sharing and managing data. Therefore, implementing a secure printing solution should be viewed as a fundamental step to ensure compliance with data protection regulations. Failure to adequately protect data across the digital and physical print network can result in heavy fines, legal action, and reputational damage that, in the most severe cases, can affect the business’s survival.

The path forward

The threat landscape is set to become more complex, with advanced cyber attacks likely to result in far-reaching financial and business impacts. Therefore, ensuring resilient and secure print infrastructure as part of the overall IT and business information environment, while supporting efficiency, is a business imperative.

Printing remains a key element of the IT infrastructure, and organizations must treat print security as any other endpoint on the network. RFID access control and mobile authentication will enable IT teams to balance security with productivity in an evolving hybrid workplace.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Remote security
  • Radio frequency Identification
  • Identity management
  • Wireless security
  • Network cameras
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Security Assessments
  • Artificial intelligence (AI)
  • Mobile access
  • GDPR
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Barricades
  • Gates
  • Barriers
  • Storage
Related white papers
Physical Access Control

Physical Access Control

Download
Machine Operator Authentication

Machine Operator Authentication

Download
RFID For GMP/GLP Environments

RFID For GMP/GLP Environments

Download
Related articles
The Importance Of Machine Authentication In Plant Safety And Security

The Importance Of Machine Authentication In Plant Safety And Security

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Security Considerations For RFID And Mobile Access

Security Considerations For RFID And Mobile Access

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
About this page

"Ensure comprehensive business security with our physical security industry portal, providing key insights on the importance of secure print solutions and RFID access control in mitigating cybersecurity risks."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec