C4502 scan to email encryption

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • slimslob
    Retired

    Site Contributor
    25,000+ Posts
    • May 2013
    • 37048

    #16
    Re: C4502 scan to email encryption

    Originally posted by Old Crow
    I believe this to be an IT issue so will definitely be passing the ball to their IT folks.
    Bear in mind, they may not have an IT provider. That could be why they asked you in the first place. They may be looking to you for IT support. You might want to search what IT services are available in your area so you can make a recommendation, if they ask.

    Comment

    • BillyCarpenter
      Field Supervisor

      Site Contributor
      VIP Subscriber
      10,000+ Posts
      • Aug 2020
      • 16308

      #17
      Re: C4502 scan to email encryption

      Originally posted by slimslob
      Bear in mind, they may not have an IT provider. That could be why they asked you in the first place. They may be looking to you for IT support. You might want to search what IT services are available in your area so you can make a recommendation, if they ask.

      Many years ago when I was a new copier tech, one of the owners asked me a question about a copier and my response was: "I don't know".


      That answer didn't go over well with the owner.

      His response to me was: What do you mean that you don't know? If you don't know, who does? What's your job title?

      I told him that I was a copier tech and he told me that if I was a copier tech that there was only 2 acceptable answers to his question:

      1. The correct answer

      or

      2. I don't have that information but I will get it for you.


      That's still burned into my brain to this day.


      Our customers expect us to know these answers or at least be informed enough to discuss it intelligently.
      Adversity temporarily visits a strong man but stays with the weak for a lifetime.

      Comment

      • Old Crow
        Trusted Tech

        Site Contributor
        100+ Posts
        • Aug 2011
        • 201

        #18
        Re: C4502 scan to email encryption

        I only spoke briefly to the customer on Friday afternoon about her concern. Basically I told her I didn't know the answer to her question but I would try to find out. It's (usually) always good to be honest and besides, this subject is not one that is easy to baffle the customer with bullshit, nor would I want to try. A few Google searches certainly don't qualify me to talk intelligently about email encryption so I'll leave that up to the IT guy(s). That said, I have stopped assuming that the various IT guys I have met over the years, when installing equipment, know more than I do. Oftentimes I have needed to help them connect for print and scan. They usually are reluctant to listen to me because I'm "just a copier guy", so what the Hell do I know?!

        Anyway, thanks for all the great input. Going there tomorrow to:

        1. Update firmware
        2. Determine what sort of IT services they currently employ
        3. Contact their IT people/person
        3. Point out that our responsibility ends when information leaves the copier
        4. Start a conversation about upgrading equipment

        Will update as to what occurs as things progress.

        Comment

        • BillyCarpenter
          Field Supervisor

          Site Contributor
          VIP Subscriber
          10,000+ Posts
          • Aug 2020
          • 16308

          #19
          Re: C4502 scan to email encryption

          I was already in the process of learning One Drive so this topic come up at a good time for me. What I'm working on now is learning how to deploy One Drive to many users on a domain but that's a subject for another day.

          Right now "security" is the topic we're dealing with.



          With Microsoft OneDrive, you can easily and securely store and access your files from all your devices. You can work with others regardless of whether they're inside or outside your organization and terminate that sharing whenever you want. OneDrive helps protect your work through advanced encryption while the data is in transit and at rest in data centers. OneDrive also helps ensure that users adhere to your most rigorous compliance standards by enabling them to choose where their data lives and providing detailed reporting of how that data has changed and been accessed. OneDrive connects you to your personal and shared files in Microsoft 365, enhancing collaboration capabilities within Microsoft 365 apps. With OneDrive on the web, desktop, or mobile, you can access all your personal files plus the files shared with you from other people or teams, including files from Microsoft Teams and SharePoint.




          • Share inside or outside your organization. Securely share files with people inside or outside your organization by using their email address, even if they don't have a Microsoft Services Account. This common sharing experience is available in the web, mobile, and desktop versions of OneDrive.

          Once again, I think One Drive is an invaluable asset.


          rthonpm was the only one thus far who knew the answer to the test.




          OneDrive guide for enterprises - OneDrive | Microsoft Docs
          Adversity temporarily visits a strong man but stays with the weak for a lifetime.

          Comment

          • BillyCarpenter
            Field Supervisor

            Site Contributor
            VIP Subscriber
            10,000+ Posts
            • Aug 2020
            • 16308

            #20
            Re: C4502 scan to email encryption

            Reading thru the Microsoft docs has been a real eye opener.



            Encryption of data in transit and at restCustomer-controlled encryption keys


            By using a Microsoft 365 feature called service encryption with Customer Key, you can upload your own encryption keys to Azure Key Vault for use encrypting your data at rest in Azure data centers. Even though this encryption is done natively through BitLocker, customers can require the use of their own key to meet their security compliance requirements. Should users lose their key, they can retrieve a deleted key from the Recycle Bin for up to 90 days (based on your configuration). Before you can use this feature, however, you must create an Azure subscription and complete a few prerequisite steps. For detailed info about service encryption with Customer Key, and how to configure it in your environment, see Controlling your data in Microsoft 365 using Customer Key.
            Adversity temporarily visits a strong man but stays with the weak for a lifetime.

            Comment

            • Old Crow
              Trusted Tech

              Site Contributor
              100+ Posts
              • Aug 2011
              • 201

              #21
              Re: C4502 scan to email encryption

              Just a follow up, we updated firmware and ensured that the SSL encryption was turned on in the user tools. Had a conversation with the customer and their IT guy about different security options, such as passwording documents, which of course seemed to be too much work to the customer. Basically, made it clear that we've done all we can as far as the copier is concerned and that once it gets beyond the copier, it is a network issue.


              Thanks for all the input!

              Comment

              Working...