Choose your language

Choose your login

Support

Blog

How to secure a network printer

Security is baked into every line of PaperCut code. And it has to be. Network printer security is a fundamental building block of your print infrastructure. We couldnā€™t transfer and print files online without it.

Network printer security best practice changes over time as threats evolve and vulnerabilities emerge. So, itā€™s impossible to write a definitive, last-guide-youā€™ll-ever-need on network printer security. Still, there are some fundamental things every organization can (and should) do to make sure their network printer vulnerabilities are understood and managed. This stuff isnā€™t rocket science, but with the average cost of a data breach now sitting at US$4.45m , itā€™s definitely worth the effort.

Want to know how to secure your network printer? Letā€™s dive into it.

The complete guide to Windows Protected Print Mode

A comprehensive overview of WPP, its timeline, and how your organization can prepare for (and benefit from) this powerful security feature.

Hero for the complete guide to Wondows Protected Print Mode

What is network printer security?

Multi-function printers are essentially computers. At least, thatā€™s how hackers see them. And they represent an often-overlooked backdoor onto your network. Think about it: everyone knows about cloud security and encrypted file transfers, but hardly anyone talks about the humble office printer.

Network printer security is simply another branch of your cyber defence strategy: itā€™s how you safeguard your online or direct IP print network from penetration or interference.

Network printer security best practice includes:

  • Robust authentication

  • Secure print release tools

  • Print job encryption

  • Network segmentation

  • Regular patching and firmware updates

Implement authentication methods

First step: authentication . You should have visibility and control over every authorized user on your network. These users need to be authenticated, ideally for each and every print job. There are a few ways to do this:

Usernames and passwords. The default authentication method, and the bare minimum of what you should be doing. Users should only be able to print and send jobs after entering their credentials, as specified in an external user directory, such as Active Directory or LDAP.

PIN numbers. Alternatively, users can authenticate using an ID number with an associated PIN. These are generally simpler and easier to remember than passwords, and often require less management from sysadmins.

Swipe cards. Instead of passwords and PINs, users can authenticate using a registered swipe card (this could include a magnetic strip, smart card or RFID). This will obviously depend on your printer model, since not all MFDs will support swipe card authentication.

2FA. In an ideal world, you should be running 2-factor authentication (2FA) or multi-factor authentication, which is any combination of the above methods, run in tandem. You can read more about MFDs and 2FA over here .

Use secure print release

In most printer networks, when a user prints from an application, the job automatically flows through to the MFD, which starts printing. This is fine for speed, but trash for security, since documents can easily get forgotten, or sit unguarded in an Out tray, where anybody can pick them up. Instead, you should implement Secure Print Release . This means that jobs are only ā€˜releasedā€™ (i.e. printed) when the user arrives at the printer and confirms their identity.

Encrypt your print jobs

Cloud print jobs should be encrypted during transfer and at rest. If youā€™re running a print management app, this should come as standard (and if it doesnā€™t, shop elsewhere immediately). There are a few factors here:

Spool file encryption. Spool file encryption is for organizations that want to safeguard sensitive information while itā€™s waiting to be printed. Itā€™s an additional security layer, specifically for your hold/release queue.

Multi-tenant SaaS. Fully hosted, multi-tenant cloud solutions need encryption specifically designed for the public internet. PaperCutā€™s in-house Edge Mesh technology is the way to go here. It comes as standard for PaperCut Hive and PaperCut Pocket.

Encryption protocols. If your network isnā€™t running SSL/TLS or IPSec, your print jobs are at risk. These common protocols encrypt print data between your device and the printer.

Cloud hosting. If youā€™re cloud hosting PaperCut MF, whether thatā€™s a private or virtual private cloud, your print environment is linked to the PaperCut server via a secure, encrypted VPN tunnel (e.g. IPSec or AWS Direct Connect).

Network segmentation

Network segmentation ā€“ dividing your printer network into smaller, isolated segments based on user permissions ā€“ is a great way to enhance your overall network security. It basically limits the fallout of any potential breach, since access to one part of the network doesnā€™t grant access to the entire network. We recommend isolating your printer from the rest of your network to protect sensitive information and reduce overall congestion. You can also use subnets to restrict certain users from accessing certain printers.

Update firmware and patches

A printer network is only as secure as its latest patch. Thatā€™s a good rule of thumb for sysadmins to follow. Thereā€™s no point installing fancy print management software, or configuring your firewall, and then leaving it to rust. At the very least, you should be automatically updating your firewall firmware with the most recent patches. Same goes for your printer software, and any third-party print management apps, like PaperCut . This will counter any emerging vulnerabilities.

Ā 

Ā 

Newsletter

Subscribe for the latest in print management and product updates!

By filling out and submitting this form, you agree that you have read our Privacy Policy, and agree to PaperCut handling your data in accordance with its terms.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.