The Key Point Blog
This week’s theme: “The Future of Connected Devices”
In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.
ReadThis week’s theme: “Securing Internet-Connected Devices in Healthcare”
The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.
ReadThis week’s theme: “Securing Devices at Home and Work”
Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.
ReadThis week’s theme: “If You Connect It, Protect It”
For the first week of NCSAM, this blog explores the unknown dangers of smart devices and provides the National Cybersecurity Alliance's "commonsense checklist" of solutions to overcome common weak points.
ReadExpands successful “bug bounty” program to office-class HP Original Ink and Toner cartridges
HP is expanding its "bug bounty" program to ink and toner cartridges. The company is challenging four professional ethical hackers to identify security vulnerabilities and risks that might be lurking in the firmware found in office-class HP Original Ink and Toner cartridges.
ReadThe 2020 theme: “Do Your Part. #BeCyberSmart”
In its 17th year, the CISA National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity in the US. This blog kicks off our series on the topics covered during this year's NCSAM.
ReadTraditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive
Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.
ReadThe Controversy Surrounding TikTok and WeChat
Technology can help us to grow our businesses, educate our children, increase the speed of gathering information, and facilitating important research, but it also puts our personal information at risk. This blog explores these dangers using TikTok and WeChat as examples.
ReadPeople Can Be Your Weakest Link or Your Best Defense
Security is a combination of people, processes, and technology. While they work in concert to protect an organization’s intellectual property or sensitive information, the people component has proven to be one of the weakest links in an organization’s security posture.
ReadWhat Print Service Providers Need to Know in Today’s Regulated Business Environment
Worldwide, legislation is being established to protect people's personally identifiable information. This blog explores the attestations and accreditation that PSPs can pursue to protect themselves.
Read