by Christoph Schell, HP Inc.
Over the past year, we’ve witnessed an increased public awareness and engagement around personal data security. The 2017 hack of Equifax compromised the data and financial information of a breathtaking 148 million people. In the wake of Facebook’s data misuse scandal, a study showed nearly one in 10 users deleted their Facebook accounts.
by Joseph Odore, Panasonic System Communications Company of North America
Most of the talk about document and hardware security — at least in the imaging industry — tends to center around the multifunction printer. With so much focus on document security, hardware vulnerability and hacking, the MFP has become just as much of a target (or a suspect, depending on your perspective) as the computer.
by Amy Weiss, The Imaging Channel
Superheroes are hot right now, and for good reason — they go around saving not just the world, but the galaxy. It’s impressive, and at some point we’ve all imagined being in their shoes (boots?). And while arc reactors, infinity stones and radioactive spiders are a bit hard to come by, there are other ways to be a superhero — just ask anyone who’s brought a company back from a ransomware attack. Hackers are much more common threats than extraterrestrial supervillains, and stories of cyberattacks, ransomware and hacking continue to make the news.
by Zia Masoom, Xerox
It is a trade-off: You cannot get the vast promise of the internet’s “get-information-anytime-anywhere” model without letting the security vulnerability genie out of the bottle. As Gary Starkweather, the inventor of the laser printer, put it, “We started working on these technologies with the purpose of sharing information, not to keep people from obtaining it. How we put security back into the system without destroying the nature of its advantages is a big challenge.”
by Hiro Imamura, Canon U S.A
Organizations and individuals today have access to an excess of data and information, a direct result of the evolving and emerging technologies entering the workforce. While companies have been able to reap the benefits of this data to optimize processes, better reach consumers, and become more efficient overall, they must also now navigate new ethical and legal land mines to ensure that they are sharing and using data responsibly. Recent events and regulations are resurfacing this issue as a global priority and, as a result, enterprises and workers are rightfully paying more attention to information security.