The purpose of this white paper is to provide guidance on the fundamental issues and concepts
of information security, as well as present solutions designed to protect information assets.
While this paper is general in nature, those tasked with management of Information Technology (IT) security will gain a better understanding of how to identify and address vulnerabilities that threaten information security. While the type of information that is at risk, and the document workflow itself, are unique to every organization, there is one constant, the need to secure each layer – from document creation through distribution and output.
Central to the document workflow is the network infrastructure and the connected digital office systems – copiers, printers, scanners, facsimile systems, and multifunctional products (MFPs) – that facilitate the generation and sharing of both digital files and paper documents. Today’s sophisticated digital office systems play a vital role in that process.
Having transformed the office landscape, digital technology brings with it new challenges. Specifically, how do you address inherent vulnerabilities that network-connected devices pose? First, assess the vulnerabilities and threats, establish security objectives, and then take appropriate countermeasures. Doing so will mitigate the risk of potentially serious security breaches, and at the same time assist you in meeting strict security compliance requirements.
read more
More...