Data security in an insecure world

1 October 2015 Integrated Solutions, Information Security

'Copier Secrets', one of the topics covered on Carte Blanche on Sunday, 30 August, highlighted how copiers retain sensitive data on their built-in hard drives and the security risks associated with this due to the potential for malicious retrieval. The programme caused a stir on social media platforms as people expressed alarm at the idea of their data and secrets being stolen and used for nefarious purposes.

Johan Basson, CEO of Bytes Document Solutions.
Johan Basson, CEO of Bytes Document Solutions.

Johan Basson, CEO of Bytes Document Solutions (BDS), a Xerox distributor, says it’s important to expand on what was covered during the programme as the copier and multifunction printer (MFP) are critical in the modern office.

“As the pioneer of xerography, the copying process around which all current office printing devices were developed, Xerox has always been at the forefront of development,” says Basson. “From the introduction of the first digital products, Xerox has recognised the risk associated with data storage on non-volatile memory devices, and has continually been building features and counter measures to help customers safeguard the integrity of this data.”

Xerox MFPs are intelligent devices that contain a computer and all the necessary software that allows them to accomplish the many tasks that have become so valuable in today’s workplace, helping make people more productive and more effective.

An MFP’s entire system, along with any device management software on the network, must be thoroughly evaluated and certified, so that all the users within an organisation can be certain that their documents and network are safe and secure from information predators – or even from internal security breaches.

“In that respect not all MFPs are equal,” says Amanda Hetherington, manager of Xerox Technology at BDS. “That’s why a comprehensive approach, based on foundational, functional, advanced and usable security, is critical in safeguarding the vital information assets of today’s businesses.”

With its global focus on security capabilities and the provision of secure solutions, every product and service that Xerox offers was designed with security in mind, and to seamlessly integrate into existing security frameworks. “Plus, security is managed throughout the entire product lifecycle, from requirements analysis, design, development, manufacturing, deployment, and disposal – giving customers more protection and peace of mind,” adds Hetherington.

Xerox ConnectKey MFPs include McAfee Embedded Control integration, resulting in the industry’s first line-up of multifunction printers that protect themselves from potential outside threats. McAfee’s whitelisting technology detects unauthorised attempts to read, write or add to protected files and directories and sends alerts if they occur.

“Importantly, we work with our clients to understand their data security requirements,” says Hetherington. “Where required, we collaborate with customers to secure their data right up to removal of the device. A final three-pass disk overwrite feature, which is proven internationally to remove all data from the drive, is done upon request, and the customer is also given a report confirming the success of the overwrite upon completion. For many of our sensitive clients we also manage a process whereby hard drives are destroyed and confirmation of this is provided to those clients.”

“We’d like to assure all of our customers that they are not at risk with their Xerox Technology. Data security is and always has been a priority for BDS and for Xerox,” confirms Basson. More information regarding the security on Xerox devices is available on www.xerox.com/security.

For more information, contact Tanya Moodley, Bytes Document Solutions, +27 (0)11 928 9111, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.