tweet-button-2015

By: Erin Gillard

The average Canadian doesn’t think too much about security in their day-to-day lives. We lock the door when we leave the house in the morning, and we may even have a house alarm. Of course we lock the car, but we’re a little annoyed by those security patches IT installs on our computer that cause us to have to restart – always at the most inconvenient times.

But what about the rest of our valuables that need protecting? I’m talking about data – the 2.5 quintillion bytes of data we produce every single day. The type of data that houses our personal information, company competitive information, banking records, passwords, customer accounts – and a host of other information that cyber-thieves would love to get their hands on.

Cyber-theft is a huge and growing problem for Canadian businesses of all sizes. A 2016 survey conducted by Toronto-based systems integrator Scalar Decisions Inc., reported that businesses receive an average of 40 cyber-attacks each year – and that number is on the rise. One vulnerability is all it takes. Protect all access points to your data including your networked printers.

Check out the infographic below to see just how wide the gap in cybersecurity protection is in Canada and follow these tips to make your Xerox device more secure:

  • Don’t connect your Xerox device directly to the public Internet. Make sure it’s behind a firewall or router so that only you and your users have access to it. This keeps outsiders from accessing the machine and interrupting your business. Please check with your IT department if you’re unsure.
  • Don’t leave the administrator’s password set to the default. Change it so that unauthorized individuals can’t guess easily guess it and take control.
  • Choose a password that is at least 8 (eight) characters in length with a combination of letters, numbers and special characters.
  • Never share the administrator’s password with anyone who does not have a legitimate need to know.
  • Enable SSL/TLS and validate any certificates used with the device. Information on this can be found in the appropriate Secure Installation and Operation document for your device. Visit the Xerox Security website to find more information about security updates, user-guides and whitepapers.

Source:: xerox news