When developing security concepts, printers are often not included in the considerations. Yet printers are complex technical devices that process, store and output sensitive data and can be used as a gateway into the network if appropriate security measures are not taken. Our checklist helps to identify and close common security weaknesses.
Our checklist (PDF) helps you to identify and close security gaps.