SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
16 things you should be doing
to secure print and documents
Shahid Shah
CTO,
Citus Health, Inc.
Dan Lohrmann
Chief Security
Officer, Security
Mentor, Inc.
Scott Schober
Cybersecurity
Expert & Author
of Hacked Again
Stacy Leidwinger
VP of Product –
Imaging, Kofax
Robert Stasio
Managing Director,
Dreamit Ventures
Tyler Carbone
COO,
Terbium Labs
Mark Gross
Senior Principal
Product Manager,
Kofax
Hardware & Software
Processes
Data
People
Understand the exposure
“What is the one solution that everyone in your
organization has access to and is accessed by many of
your key business systems? It is your printer. Yet when
it comes to data security, all too often it is the one area
that is overlooked.”
Stacy Leidwinger, VP of Product – Imaging, Kofax
Set higher standards
“Hold printer and fax device manufacturers to the
same level of scrutiny as computer servers. Print/fax
have the same baseline security vulnerabilities but then
they are more vulnerable because there are additional
capabilities which other servers don’t have.”
Shahid Shah, CTO at Citus Health, Inc.
Enable all security
“Enable the security features that are available,
including stronger Wi-Fi security settings. Follow best
practices. Do an assessment of current configurations—
know what you have in place now. Change default
settings and passwords.”
Dan Lohrmann, Chief Security Officer at Security Mentor, Inc.
Establish a security framework
“Focus on hygiene (updates, best practices, etc.),
implement the best defensive technologies you can,
and set up within a risk management framework that
minimizes damage if a breach occurs and ensures that
operations can continue after it does.”
Tyler Carbone, COO at Terbium Labs
Implement 24/7 monitoring
“The best prevention mechanism with connected
devices is monitoring. There are multiple vendors in the
IoT space which can look at a network tap and monitor
threats across all connected devices.”
Robert Stasio, Managing Director at Dreamit Ventures
Hardware & Software
Processes
Data
People
Create clear policies
“Writing a clear internal policy is essential to print and
document security. When printed documents are not
removed from the outbound print tray, they need to
have a short life before they need to be shredded.”
Scott Schober, Cybersecurity Expert & Author of Hacked Again
Minimize vulnerabilities
“Check workflows associated with the utilization of fax
and printing—encourage their use when it makes sense
but remove the steps from workflows where security is
more important than convenience.”
Shahid Shah, CTO at Citus Health, Inc.
Use tools that reduce risk
“Obtaining signatures can add layers of documents
as you need to print, scan, and email. These stages
allow sensitive data to be at risk of being copied or
intercepted. Utilize e-signature tools to maintain
security and minimize all the extra printing.”
Scott Schober, Cybersecurity Expert & Author of Hacked Again
Automate processes
“The best process is one that is automated. The more
processes you can automate, the less security risk you
will face and you will have an auto-generated audit trail
for internal and external audits.”
Stacy Leidwinger, VP of Product – Imaging, Kofax
Hardware & Software
Processes
Data
People
Audit your data
“Start implementing auditing of storage on print/fax
servers to see what data is being left on those devices
that could potentially be exploited.”
Shahid Shah, CTO at Citus Health, Inc.
Go digital
“A significant amount of print is created simply to
access a single piece of information within a larger
dataset, after which the entire printout is discarded.
Converting back-office print to electronic delivery
gives the user access to the information without the
risk of ink on paper or the waste of resources.”
Mark Gross, Senior Principal Product Manager, Kofax
Add intelligence
“By adding intelligence and rules you can ensure
that private information is never even inked on the
page. Data security starts with ensuring that only
the information allowed to be printed for viewing
is printed.”
Stacy Leidwinger, VP of Product – Imaging, Kofax
Hardware & Software
Processes
Data
People
Train and raise awareness
“Microsoft Excel and Microsoft Word are two of the
most commonly used business programs, yet many
users do not utilize the password protection feature
to restrict unauthorized users from opening and/or
modifying the document.”
Scott Schober, Cybersecurity Expert & Author of Hacked Again
Respect user experiences
“Convenience drives compliance. When enforcing
print security measures, you need to make it seamless
for your workers so they will not look for ways to bypass
the security you have in place.”
Stacy Leidwinger, VP of Product – Imaging, Kofax
Actively review activity
“Companies implement print and scan management
software which capture audit logs and reports of user
activity, but then fail to review the logs for suspicious
activity (e.g. significant printing after-hours). Regular
reviews can identify security issues earlier.”
Mark Gross, Senior Principal Product Manager, Kofax
On and offboard access
“A critical step many companies overlook is to ensure
when an employee leaves, retires, or is terminated,
their access to the network is revoked so they cannot
download any sensitive documents.”
Scott Schober, Cybersecurity Expert & Author of Hacked Again
1	 Understand the exposure
2	 Set higher standards
3	 Enable all security
4	 Establish a security framework
5	 Implement 24/7 monitoring
6	 Create clear policies
7	 Minimize vulnerabilities
8	 Use tools that reduce risk
9	 Automate processes
10	 Audit your data
11	 Go digital
12	 Add intelligence
13	 Train and raise awareness
14	 Respect user experiences
15	 Actively review activity
16	 On and offboard access
Ensure print and document security
Learn more about your print security risks at
www.kofax.com/DocumentsAreDangerous

Contenu connexe

Tendances

Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Outpost24
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in PerspectiveDragos, Inc.
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos, Inc.
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsBSides Delhi
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityRapid7
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSAlienVault
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersDragos, Inc.
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultAlienVault
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 

Tendances (20)

Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in Perspective
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 

Similaire à Kofax Document Security

16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and DocumentsNuance Communications
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdfSavinder Puri
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Jeff Hunter
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Data security in practice
Data security in practiceData security in practice
Data security in practiceAndres Kütt
 
What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?Dev Software
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 

Similaire à Kofax Document Security (20)

16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
Ssdf nist
Ssdf nistSsdf nist
Ssdf nist
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Data security in practice
Data security in practiceData security in practice
Data security in practice
 
What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 

Plus de Kofax

How to Pitch RPA: Your Guide to Getting Stakeholder Approvals
How to Pitch RPA: Your Guide to Getting Stakeholder ApprovalsHow to Pitch RPA: Your Guide to Getting Stakeholder Approvals
How to Pitch RPA: Your Guide to Getting Stakeholder ApprovalsKofax
 
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...Kofax
 
Breaking out of Perception Prison
Breaking out of Perception PrisonBreaking out of Perception Prison
Breaking out of Perception PrisonKofax
 
Choosing the Right Vehicle For Change
Choosing the Right Vehicle For ChangeChoosing the Right Vehicle For Change
Choosing the Right Vehicle For ChangeKofax
 
Customer Engagement for Trailblazers
Customer Engagement for TrailblazersCustomer Engagement for Trailblazers
Customer Engagement for TrailblazersKofax
 
Kofax TotalAgility for Trailblazers
Kofax TotalAgility for TrailblazersKofax TotalAgility for Trailblazers
Kofax TotalAgility for TrailblazersKofax
 
Transform 2015: The Art of Customer Engagement
Transform 2015: The Art of Customer EngagementTransform 2015: The Art of Customer Engagement
Transform 2015: The Art of Customer EngagementKofax
 
Transform 2014: User-Centric Business Tools Based on Kapow Software™
Transform 2014: User-Centric Business Tools Based on Kapow Software™Transform 2014: User-Centric Business Tools Based on Kapow Software™
Transform 2014: User-Centric Business Tools Based on Kapow Software™Kofax
 
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...Kofax
 
Transform 2014: Trends in Procure to Pay
Transform 2014: Trends in Procure to PayTransform 2014: Trends in Procure to Pay
Transform 2014: Trends in Procure to PayKofax
 
Transform 2014: Introducing Kofax TotalAgility® Cloud
Transform 2014: Introducing Kofax TotalAgility® CloudTransform 2014: Introducing Kofax TotalAgility® Cloud
Transform 2014: Introducing Kofax TotalAgility® CloudKofax
 
Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement Kofax
 
Transform 2014: Best Practices in Integrating Analytics into Your Environment
Transform 2014: Best Practices in Integrating Analytics into Your EnvironmentTransform 2014: Best Practices in Integrating Analytics into Your Environment
Transform 2014: Best Practices in Integrating Analytics into Your EnvironmentKofax
 
Transform 2014: Kofax Altosoft™ Insight - Deep Dive
 Transform 2014: Kofax Altosoft™ Insight - Deep Dive Transform 2014: Kofax Altosoft™ Insight - Deep Dive
Transform 2014: Kofax Altosoft™ Insight - Deep DiveKofax
 
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...Kofax
 
Kofax in Healthcare
Kofax in HealthcareKofax in Healthcare
Kofax in HealthcareKofax
 
Kofax Connect: Making the First Mile of Business Smarter
Kofax Connect: Making the First Mile of Business SmarterKofax Connect: Making the First Mile of Business Smarter
Kofax Connect: Making the First Mile of Business SmarterKofax
 
Deliver More Information to your SharePoint Solution: Kofax Express and Share...
Deliver More Information to your SharePoint Solution: Kofax Express and Share...Deliver More Information to your SharePoint Solution: Kofax Express and Share...
Deliver More Information to your SharePoint Solution: Kofax Express and Share...Kofax
 
Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...Kofax
 
Mobile Customer Engagement in the First Mile
Mobile Customer Engagement in the First MileMobile Customer Engagement in the First Mile
Mobile Customer Engagement in the First MileKofax
 

Plus de Kofax (20)

How to Pitch RPA: Your Guide to Getting Stakeholder Approvals
How to Pitch RPA: Your Guide to Getting Stakeholder ApprovalsHow to Pitch RPA: Your Guide to Getting Stakeholder Approvals
How to Pitch RPA: Your Guide to Getting Stakeholder Approvals
 
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...
Game Changer: Why RPA and Cognitive Document Automation Should Be Your Next D...
 
Breaking out of Perception Prison
Breaking out of Perception PrisonBreaking out of Perception Prison
Breaking out of Perception Prison
 
Choosing the Right Vehicle For Change
Choosing the Right Vehicle For ChangeChoosing the Right Vehicle For Change
Choosing the Right Vehicle For Change
 
Customer Engagement for Trailblazers
Customer Engagement for TrailblazersCustomer Engagement for Trailblazers
Customer Engagement for Trailblazers
 
Kofax TotalAgility for Trailblazers
Kofax TotalAgility for TrailblazersKofax TotalAgility for Trailblazers
Kofax TotalAgility for Trailblazers
 
Transform 2015: The Art of Customer Engagement
Transform 2015: The Art of Customer EngagementTransform 2015: The Art of Customer Engagement
Transform 2015: The Art of Customer Engagement
 
Transform 2014: User-Centric Business Tools Based on Kapow Software™
Transform 2014: User-Centric Business Tools Based on Kapow Software™Transform 2014: User-Centric Business Tools Based on Kapow Software™
Transform 2014: User-Centric Business Tools Based on Kapow Software™
 
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...
Transform 2014: Mobility and its Impact on Your Business, Operations and Proc...
 
Transform 2014: Trends in Procure to Pay
Transform 2014: Trends in Procure to PayTransform 2014: Trends in Procure to Pay
Transform 2014: Trends in Procure to Pay
 
Transform 2014: Introducing Kofax TotalAgility® Cloud
Transform 2014: Introducing Kofax TotalAgility® CloudTransform 2014: Introducing Kofax TotalAgility® Cloud
Transform 2014: Introducing Kofax TotalAgility® Cloud
 
Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement Transform 2014: Aligning to Your Customer's Systems of Engagement
Transform 2014: Aligning to Your Customer's Systems of Engagement
 
Transform 2014: Best Practices in Integrating Analytics into Your Environment
Transform 2014: Best Practices in Integrating Analytics into Your EnvironmentTransform 2014: Best Practices in Integrating Analytics into Your Environment
Transform 2014: Best Practices in Integrating Analytics into Your Environment
 
Transform 2014: Kofax Altosoft™ Insight - Deep Dive
 Transform 2014: Kofax Altosoft™ Insight - Deep Dive Transform 2014: Kofax Altosoft™ Insight - Deep Dive
Transform 2014: Kofax Altosoft™ Insight - Deep Dive
 
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...
Transform 2014: Kofax TotalAgility™ Accounts Payable Automation – A Best-In-C...
 
Kofax in Healthcare
Kofax in HealthcareKofax in Healthcare
Kofax in Healthcare
 
Kofax Connect: Making the First Mile of Business Smarter
Kofax Connect: Making the First Mile of Business SmarterKofax Connect: Making the First Mile of Business Smarter
Kofax Connect: Making the First Mile of Business Smarter
 
Deliver More Information to your SharePoint Solution: Kofax Express and Share...
Deliver More Information to your SharePoint Solution: Kofax Express and Share...Deliver More Information to your SharePoint Solution: Kofax Express and Share...
Deliver More Information to your SharePoint Solution: Kofax Express and Share...
 
Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...Putting Content in Context: Getting Information into SharePoint for Content M...
Putting Content in Context: Getting Information into SharePoint for Content M...
 
Mobile Customer Engagement in the First Mile
Mobile Customer Engagement in the First MileMobile Customer Engagement in the First Mile
Mobile Customer Engagement in the First Mile
 

Dernier

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 

Dernier (20)

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Kofax Document Security

  • 1. 16 things you should be doing to secure print and documents
  • 2. Shahid Shah CTO, Citus Health, Inc. Dan Lohrmann Chief Security Officer, Security Mentor, Inc. Scott Schober Cybersecurity Expert & Author of Hacked Again Stacy Leidwinger VP of Product – Imaging, Kofax Robert Stasio Managing Director, Dreamit Ventures Tyler Carbone COO, Terbium Labs Mark Gross Senior Principal Product Manager, Kofax
  • 4. Understand the exposure “What is the one solution that everyone in your organization has access to and is accessed by many of your key business systems? It is your printer. Yet when it comes to data security, all too often it is the one area that is overlooked.” Stacy Leidwinger, VP of Product – Imaging, Kofax
  • 5. Set higher standards “Hold printer and fax device manufacturers to the same level of scrutiny as computer servers. Print/fax have the same baseline security vulnerabilities but then they are more vulnerable because there are additional capabilities which other servers don’t have.” Shahid Shah, CTO at Citus Health, Inc.
  • 6. Enable all security “Enable the security features that are available, including stronger Wi-Fi security settings. Follow best practices. Do an assessment of current configurations— know what you have in place now. Change default settings and passwords.” Dan Lohrmann, Chief Security Officer at Security Mentor, Inc.
  • 7. Establish a security framework “Focus on hygiene (updates, best practices, etc.), implement the best defensive technologies you can, and set up within a risk management framework that minimizes damage if a breach occurs and ensures that operations can continue after it does.” Tyler Carbone, COO at Terbium Labs
  • 8. Implement 24/7 monitoring “The best prevention mechanism with connected devices is monitoring. There are multiple vendors in the IoT space which can look at a network tap and monitor threats across all connected devices.” Robert Stasio, Managing Director at Dreamit Ventures
  • 10. Create clear policies “Writing a clear internal policy is essential to print and document security. When printed documents are not removed from the outbound print tray, they need to have a short life before they need to be shredded.” Scott Schober, Cybersecurity Expert & Author of Hacked Again
  • 11. Minimize vulnerabilities “Check workflows associated with the utilization of fax and printing—encourage their use when it makes sense but remove the steps from workflows where security is more important than convenience.” Shahid Shah, CTO at Citus Health, Inc.
  • 12. Use tools that reduce risk “Obtaining signatures can add layers of documents as you need to print, scan, and email. These stages allow sensitive data to be at risk of being copied or intercepted. Utilize e-signature tools to maintain security and minimize all the extra printing.” Scott Schober, Cybersecurity Expert & Author of Hacked Again
  • 13. Automate processes “The best process is one that is automated. The more processes you can automate, the less security risk you will face and you will have an auto-generated audit trail for internal and external audits.” Stacy Leidwinger, VP of Product – Imaging, Kofax
  • 15. Audit your data “Start implementing auditing of storage on print/fax servers to see what data is being left on those devices that could potentially be exploited.” Shahid Shah, CTO at Citus Health, Inc.
  • 16. Go digital “A significant amount of print is created simply to access a single piece of information within a larger dataset, after which the entire printout is discarded. Converting back-office print to electronic delivery gives the user access to the information without the risk of ink on paper or the waste of resources.” Mark Gross, Senior Principal Product Manager, Kofax
  • 17. Add intelligence “By adding intelligence and rules you can ensure that private information is never even inked on the page. Data security starts with ensuring that only the information allowed to be printed for viewing is printed.” Stacy Leidwinger, VP of Product – Imaging, Kofax
  • 19. Train and raise awareness “Microsoft Excel and Microsoft Word are two of the most commonly used business programs, yet many users do not utilize the password protection feature to restrict unauthorized users from opening and/or modifying the document.” Scott Schober, Cybersecurity Expert & Author of Hacked Again
  • 20. Respect user experiences “Convenience drives compliance. When enforcing print security measures, you need to make it seamless for your workers so they will not look for ways to bypass the security you have in place.” Stacy Leidwinger, VP of Product – Imaging, Kofax
  • 21. Actively review activity “Companies implement print and scan management software which capture audit logs and reports of user activity, but then fail to review the logs for suspicious activity (e.g. significant printing after-hours). Regular reviews can identify security issues earlier.” Mark Gross, Senior Principal Product Manager, Kofax
  • 22. On and offboard access “A critical step many companies overlook is to ensure when an employee leaves, retires, or is terminated, their access to the network is revoked so they cannot download any sensitive documents.” Scott Schober, Cybersecurity Expert & Author of Hacked Again
  • 23. 1 Understand the exposure 2 Set higher standards 3 Enable all security 4 Establish a security framework 5 Implement 24/7 monitoring 6 Create clear policies 7 Minimize vulnerabilities 8 Use tools that reduce risk 9 Automate processes 10 Audit your data 11 Go digital 12 Add intelligence 13 Train and raise awareness 14 Respect user experiences 15 Actively review activity 16 On and offboard access Ensure print and document security
  • 24. Learn more about your print security risks at www.kofax.com/DocumentsAreDangerous