Data security in an insecure world

1 October 2015 Integrated Solutions, Information Security

'Copier Secrets', one of the topics covered on Carte Blanche on Sunday, 30 August, highlighted how copiers retain sensitive data on their built-in hard drives and the security risks associated with this due to the potential for malicious retrieval. The programme caused a stir on social media platforms as people expressed alarm at the idea of their data and secrets being stolen and used for nefarious purposes.

Johan Basson, CEO of Bytes Document Solutions.
Johan Basson, CEO of Bytes Document Solutions.

Johan Basson, CEO of Bytes Document Solutions (BDS), a Xerox distributor, says it’s important to expand on what was covered during the programme as the copier and multifunction printer (MFP) are critical in the modern office.

“As the pioneer of xerography, the copying process around which all current office printing devices were developed, Xerox has always been at the forefront of development,” says Basson. “From the introduction of the first digital products, Xerox has recognised the risk associated with data storage on non-volatile memory devices, and has continually been building features and counter measures to help customers safeguard the integrity of this data.”

Xerox MFPs are intelligent devices that contain a computer and all the necessary software that allows them to accomplish the many tasks that have become so valuable in today’s workplace, helping make people more productive and more effective.

An MFP’s entire system, along with any device management software on the network, must be thoroughly evaluated and certified, so that all the users within an organisation can be certain that their documents and network are safe and secure from information predators – or even from internal security breaches.

“In that respect not all MFPs are equal,” says Amanda Hetherington, manager of Xerox Technology at BDS. “That’s why a comprehensive approach, based on foundational, functional, advanced and usable security, is critical in safeguarding the vital information assets of today’s businesses.”

With its global focus on security capabilities and the provision of secure solutions, every product and service that Xerox offers was designed with security in mind, and to seamlessly integrate into existing security frameworks. “Plus, security is managed throughout the entire product lifecycle, from requirements analysis, design, development, manufacturing, deployment, and disposal – giving customers more protection and peace of mind,” adds Hetherington.

Xerox ConnectKey MFPs include McAfee Embedded Control integration, resulting in the industry’s first line-up of multifunction printers that protect themselves from potential outside threats. McAfee’s whitelisting technology detects unauthorised attempts to read, write or add to protected files and directories and sends alerts if they occur.

“Importantly, we work with our clients to understand their data security requirements,” says Hetherington. “Where required, we collaborate with customers to secure their data right up to removal of the device. A final three-pass disk overwrite feature, which is proven internationally to remove all data from the drive, is done upon request, and the customer is also given a report confirming the success of the overwrite upon completion. For many of our sensitive clients we also manage a process whereby hard drives are destroyed and confirmation of this is provided to those clients.”

“We’d like to assure all of our customers that they are not at risk with their Xerox Technology. Data security is and always has been a priority for BDS and for Xerox,” confirms Basson. More information regarding the security on Xerox devices is available on www.xerox.com/security.

For more information, contact Tanya Moodley, Bytes Document Solutions, +27 (0)11 928 9111, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...