Data security in an insecure world

1 October 2015 Integrated Solutions, Information Security

'Copier Secrets', one of the topics covered on Carte Blanche on Sunday, 30 August, highlighted how copiers retain sensitive data on their built-in hard drives and the security risks associated with this due to the potential for malicious retrieval. The programme caused a stir on social media platforms as people expressed alarm at the idea of their data and secrets being stolen and used for nefarious purposes.

Johan Basson, CEO of Bytes Document Solutions.
Johan Basson, CEO of Bytes Document Solutions.

Johan Basson, CEO of Bytes Document Solutions (BDS), a Xerox distributor, says it’s important to expand on what was covered during the programme as the copier and multifunction printer (MFP) are critical in the modern office.

“As the pioneer of xerography, the copying process around which all current office printing devices were developed, Xerox has always been at the forefront of development,” says Basson. “From the introduction of the first digital products, Xerox has recognised the risk associated with data storage on non-volatile memory devices, and has continually been building features and counter measures to help customers safeguard the integrity of this data.”

Xerox MFPs are intelligent devices that contain a computer and all the necessary software that allows them to accomplish the many tasks that have become so valuable in today’s workplace, helping make people more productive and more effective.

An MFP’s entire system, along with any device management software on the network, must be thoroughly evaluated and certified, so that all the users within an organisation can be certain that their documents and network are safe and secure from information predators – or even from internal security breaches.

“In that respect not all MFPs are equal,” says Amanda Hetherington, manager of Xerox Technology at BDS. “That’s why a comprehensive approach, based on foundational, functional, advanced and usable security, is critical in safeguarding the vital information assets of today’s businesses.”

With its global focus on security capabilities and the provision of secure solutions, every product and service that Xerox offers was designed with security in mind, and to seamlessly integrate into existing security frameworks. “Plus, security is managed throughout the entire product lifecycle, from requirements analysis, design, development, manufacturing, deployment, and disposal – giving customers more protection and peace of mind,” adds Hetherington.

Xerox ConnectKey MFPs include McAfee Embedded Control integration, resulting in the industry’s first line-up of multifunction printers that protect themselves from potential outside threats. McAfee’s whitelisting technology detects unauthorised attempts to read, write or add to protected files and directories and sends alerts if they occur.

“Importantly, we work with our clients to understand their data security requirements,” says Hetherington. “Where required, we collaborate with customers to secure their data right up to removal of the device. A final three-pass disk overwrite feature, which is proven internationally to remove all data from the drive, is done upon request, and the customer is also given a report confirming the success of the overwrite upon completion. For many of our sensitive clients we also manage a process whereby hard drives are destroyed and confirmation of this is provided to those clients.”

“We’d like to assure all of our customers that they are not at risk with their Xerox Technology. Data security is and always has been a priority for BDS and for Xerox,” confirms Basson. More information regarding the security on Xerox devices is available on www.xerox.com/security.

For more information, contact Tanya Moodley, Bytes Document Solutions, +27 (0)11 928 9111, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...