Are reading: Wen Yin and environment vulnerabilities are becoming hackers to launch an attack | 'Back door' | Wen Yin and environment vulnerabilities are becoming hackers to attack | 'back door'

June 25, 2018, Mr. Yang Zijiang, General Manager of Value-Added Products Division, Printer & Consumables Business Unit, Hewlett-Packard Company, Beijing, China Signed the article - Digital transformation and upgrading are rapidly sweeping across industries and industries. To adapt to changing and evolving work methods, More companies adopt software, cloud (multiple cloud computing and storage services) and hardware network system management models, resulting in increasingly complex network attacks and data breaches. The scale also shows explosive growth.


Mr. Yang Zijiang, General Manager of Value-Added Products Division, Printer and Consumables Business Unit, Hewlett-Packard Company, Beijing, China

The importance and urgency of the protection of networks and terminal equipment are more prominent than ever.

Enterprises need to re-examine their security policies and focus on using new ways to prevent potential loopholes in networked terminal devices and avoid operational risks. We remind everyone that the security of enterprise networks and terminal equipment depends on the system. The weakest link in the protection and effectiveness.

In this case, although it involves highly confidential documents and internal data networks, Wen Yin, as a traditional process in most enterprises, is often overlooked when formulating security policies. This is tantamount to opening a 'back door' to hackers.

As early as 2015, researchers at the Singapore University of Technology and Design warned that drones connected to mobile phones could help hackers attack WiFi-connected printers in high-rise buildings. In the experiment, researchers managed to invade the Central Business District (CBD) in Singapore. High-rise 30th floor printer.

In 2016, during the sensational Bangladesh Central Bank theft case, hackers started from the bank’s SWIFT payment system and attempted to steal 951 million U.S. dollars in huge sums. Eventually there are still more than 80 million U.S. dollars still missing. In this case, senior hackers attacked. An important link is that the hacker controls the printer so that it does not automatically print transaction information that can reveal hacking traces. If the bank's printer has not been compromised, it can automatically print fraudulent transaction information in the event of an attack, causing the bank to Be alert, hackers will not succeed.

By 2018, the hacking method was more advanced and complicated. However, the security protocol was not upgraded accordingly.

IT departments often apply strict security standards to computers, tablets, and other connected devices, but they ignore the security of the printer because they naively believe that hackers will not pay attention to these 'inconspicuous' printers.

In fact, the printer is an important terminal device, and people generally lack understanding of this point. HP's research data shows that in the lack of security printers, less than 2% of the printers will be free from security threats, and the latest research found that Up to 60,000 models of printers are vulnerable to cyber attacks.

Companies in the Asia Pacific region are actively investing and expanding their IT infrastructure, adding new devices to the network almost every day, but they should understand that there are no short-cuts on how to protect all devices in the enterprise network, especially those deployed for many years. The terminal equipment should be highly valued.

Thankfully, more and more companies in the Asia-Pacific region are beginning to recognize the threat posed by insecure documents and printing environments. The research organization IDC pointed out that although more than 30% of the organizations have not set up appropriate security policies to manage and Control of access and use rights of printers and multifunction printers in the network, but more than half of respondents expressed great concern about unauthorized use of copiers or multifunction printers.

Earlier, Hewlett-Packard’s official website launched a publicity video aimed at the financial and healthcare sectors. It urged everyone to pay attention to the security of the printing environment and ensure information security. At the same time, HP believes that cyber security is everyone’s responsibility and cannot be limited to devices alone. The end-users should bear the responsibility. Enterprises should choose trusted partners to help them fully understand the risks, deploy appropriate security policies, meet legal requirements, and avoid losses. HP's goal is not just to stay in equipment (such as commercial printers) Establishing more protective defenses is how to integrate powerful detection and recovery functions from the beginning, because it helps customers to respond more flexibly to evolving destructive attacks.

To that end, HP introduced HP Enterprise Printers with multiple layers of security that provide in-depth defenses such as real-time threat detection, automated monitoring, and software verification to keep threats out the door. These printers have enhanced features and self-healing capabilities. , Its embedded features and plug-in solutions can help protect against threats throughout the product's life cycle, providing effective protection for printers. HP Business Printers can also protect data with strong encryption of transmissions and static data and use hosting The service ensures the safe deployment of the system.

HP believes that as a terminal device used by almost everyone in the enterprise, the printer should be part of the protection of information security, and should not become a 'back door' for hackers.

2016 GoodChinaBrand | ICP: 12011751 | China Exports