The purpose of this white paper is to provide guidance on the fundamental issues and concepts of information security, as well as present solutions designed to protect information assets. While this paper is general in nature, those tasked with management of Information Technology (IT) security will gain a better understanding of how to identify and address vulnerabilities that threaten information security. While the type of information that is at risk,
and the document workflow itself, are unique to every organization, there is one constant, the need to secure each layer – from document creation through distribution and output.

Central to the document workflow is the network infrastructure and the connected digital office systems – copiers, printers, scanners, facsimile systems, and multifunctional products (MFPs) – that facilitate the generation and sharing of both digital files and paper documents. Today’s sophisticated digital office systems play a vital role in that process.

Having transformed the office landscape, digital technology brings with it new challenges. Specifically, how do you address inherent vulnerabilities that network-connected devices pose? First, assess the vulnerabilities and threats, establish security objectives, and then take appropriate countermeasures. Doing so will mitigate the risk of potentially serious security breaches, and at the same time assist you in meeting strict security compliance requirements.

Whether your organization is comprised of 10 or 10,000 employees, information security should be a top priority. Once that commitment is made, steps can be taken to prevent your business interests from being undermined by inside or outside forces. This is called “risk management,” the principle that assets should be protected through the adoption of appropriate safeguards.

read more



More...