Sharp DX-C400 - Color - All-in-One Manuel d'utilisateur Page 3

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 8
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 2
An MFP is a powerful asset in your offices environment. Left unsecured however, an MFP can pose one of the greatest threats to your
organization. Just consider the types of documents that are copied, printed, faxed or scanned on a daily basis personal information,
financial statements, confidential reports, e-mails, memos, customer data and employee information.
Intellectual property, private and personal information becomes portable once processed by an MFP, and is extremely susceptible to
malicious use from both internal and external threats. While not all risks to confidential information are considered malicious, the
potential for significant damage from inadequate protection can be only a matter of time.
COMMON VULNERABILITIES
Some of the most common vulnerabilities associated with an unsecured MFP include:
Loss of productivity
Regulatory non-compliance
Loss of access
Stolen information
Lawsuits
Unauthorized use
INTERNAL THREATS
At the device, confidential information can be accidentally
or even purposefully copied from stored documents, taken from
the output tray or faxed without authorization. Any information stored on a
local desktop computer or accessible through the Local Area Network (LAN) can be printed without authorization.
EXTERNAL THREAT S
From across a Wide-Area Network (WAN), the Internet or a Virtual Private Network (VPN), information such as stored documents,
scan data or print data can be intercepted. In the worst case, a user from the outside can obtain confidential information, unleash a
Denial of Service (DOS) attack, or even place a
virus on the device via the network or a phone
line. Through a FAX line, or corporate LAN,
communications could be intercepted or sent
without permission anywhere in the world.
Even MFP data stored on a hard disk drive or in memory could be
compromised or even taken off-site and stolen if not protected.
T H E R I S K S T O O F F I C E M U L T I F U N C T I O N P E R I P H E R A L S
Vue de la page 2
1 2 3 4 5 6 7 8

Commentaires sur ces manuels

Pas de commentaire