Addresses growing demand for end-to-end print security solutions for hybrid workforces
"In celebration of Cybersecurity Awareness Month (U.S.), HP Inc. announced its enterprise printers and Original HP cartridges are now ISO/IEC 20243 certified. Granted by The Open Group, the ISO/IEC 20243 standard is a set of requirements and recommendations for mitigating maliciously tainted and counterfeit products. By earning this certification, HP is ensuring its enterprise printers and Original HP cartridges follow best practices for global supply chain security throughout the product lifecycle.
The shift to hybrid work models is creating new, emerging and more frequent threats. In fact, an HP study found that 45% of IT decision makers reported evidence of compromised printers being used as an attack point over the last year as remote work increased. Keeping company devices, networks and data secure has become an immense challenge for IT departments navigating this new model of working..."
With the hybrid workforce here to stay for many companies, employees are working from more diverse locations than ever before. This makes it critical for IT to have the right security in place to protect employee devices and sensitive company data.
"The true risk with a lost or stolen PC isn't just the hardware cost and lost productivity. The average cost of data breach from a lost or stolen laptop has surpassed $4 million globally and can top over $9 million in the US.1 Malicious actors can wreak havoc on your corporate network and gain access to valuable company IP faster than it typically takes an organization to identify and contain a breach, which is over nine and a half months.
Hybrid work environments will only continue to exacerbate this threat. With the reality of only 1 in 3 remote workers having a dedicated home office space,3 and the expanded availability of public internet access expected over the next four years, a recent HP Wolf Security study found that 81% of IT managers feel that the flexibility allowed by remote work significantly increases the threat of corporate network breaches.5 But what if your IT team had a way to stop a breach on a missing device in its tracks, or prevent it before it even had a chance to begin?..."