New Customer Application


HP Printer Security


HP Connection Inspector is a new intelligent embedded security feature created by HP Labs. The technology inspects outbound network connections typically abused by malware, determines what is normal and stop suspicious activity. If the printer is compromised, it will automatically trigger a system restart to initiate HP Sure Start self-healing procedures.


HP Print Security isn't just about securing your printer. It's about helping to secure your entire network with real-time threat detection, automated monitoring, and built-in software validation that no one else offers. More details

Printer security breaches are very real
Every day you hear about a new hack, a new victim of cybercrime. It is uncommon to hear exactly how these breaches occurred since attacks are not widely publicized unless the target company is compelled by regulations to publish the findings of their forensic audit. Recently, a security breach occurred through printers and was promoted by the hacker seeking notoriety for his actions.
"Printers at 12 Colleges Spew Hate Fliers in Suspected Hack [A known hacker] told The Washington Times he was behind the breach, using a freely available tool to scour "basically ... the whole English-speaking Internet" for vulnerable devices that could be remotely accessed. He claims to have within minutes identified roughly 29,000 printers that were connected to the Internet and could be exploited through an open port, then automated a procedure that asked each vulnerable machine to print a ["hate" flyer]. The fliers were discovered this week at Princeton University, Northeastern University, UMass Amherst, Smith College, Mt. Holyoke, University of California at Berkley and Depaulia."
Andrew Blake, The Washington Times, Friday, March 25, 2016
Our intent is not to draw more attention to this hacker, but to highlight the fact that he was able to easily discover thousands of unsecured printers on the Internet and send a print job. This appears to be just a stunt, but it could have been much worse. Point in case, consider another attack that occurred this same week where a company's data was being held ransom. The "hate flyer" hacker used an unsecured port (9100) and accessed printers with public IP addresses to push a print job. He could have just as easily intercepted data through a man-in-the-middle attack, accessed data on the device, used the printer as a portal to the company network or even disabled the device
Do you know your printers security level?
Contact us so we can help you determine the security level you need