Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      South Africa begins complex job of overhauling media laws

      13 July 2025

      Nvidia CEO to hold high stakes media briefing in Beijing

      13 July 2025

      Blue Label Telecoms to change its name as restructuring gathers pace

      11 July 2025

      Get your ID delivered like pizza – home affairs’ latest digital shake-up

      11 July 2025

      EFF vows to stop Starlink from launching in South Africa

      11 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » 5 annoying ways to get document security wrong

    5 annoying ways to get document security wrong

    Promoted | There are some annoyingly easy ways to lose sensitive files when you’re using the wrong kind of printer.
    By Altron Document Solutions18 January 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Even the smallest businesses are starting to realise document security matters. But while most stories about security breaches focus on secret government attacks and evil cyber villains, the most common threats are a lot less exciting.

    In practice, there are some annoyingly easy ways to lose sensitive files when you’re using the wrong kind of printer.

    1. Like leaving them in the printer tray

    You know that stack of documents lying on your printer? That’s wasteful. But it’s a threat too. In that stack might be someone’s pay review, your customers’ data or your company’s financial plans and roadmap. If you don’t want that stuff just lying around, make sure your printer’s smart enough to authenticate your users before it prints out their documents.

    2. Sending files without password-protecting them

    You need to scan a file and send it to your colleague, John. You’re in a hurry. So you scan the document really quick and mail it to John – the wrong John. Oops. Get yourself a printer that helps you password-protect files.

    3. Saving the sensitive files in an unsafe folder

    When someone needs to scan a document and then save it to the cloud, they usually need to save that scanned file somewhere local first. It might be their desktop or some local folder. But if they forget to delete that file after copying it to a shared Dropbox or Google Drive or wherever, you’ve got a problem. Make sure you’ve got a printer that’s smart enough to automatically save your users’ files in the cloud for them. And they won’t leave sensitive files lying around.

    4. Getting someone else to print for you

    Sometimes remote workers need something printed before they come in. A common way around this is to ask someone else to print the file for them. But if they save that sensitive file in an unsafe place, you might be in trouble. If your printer supports mobile printing, your remote workers won’t need to go through someone else to print their files. And this won’t be a problem.

    5. Leaving the data on the printer’s hard drive

    You probably don’t think of your printer as a computer. But the smartest printers have hard drives and they’re central to the way information flows through your company. So, make sure your printer automatically overwrites its own hard drive for you. More important, make sure the printer’s disk is well encrypted, too.

    No business wants to lose its sensitive information. But you really don’t want to lose that information because of a simple, avoidable mistake. Avoid these by getting yourself a smarter printer – one that has all the features you need to secure the flow of information. And all the intelligence to help your users work in smarter ways.

    Get security right with Xerox ConnectKey technology

    Information security is a priority for every size of business. It’s why so many businesses count on Xerox ConnectKey technology to protect themselves. Find out how it can improve your productivity, mobility and security.

    • Read more articles by Altron Document Solutions on TechCentral
    • This promoted content was paid for by the party concerned


    ADS Altron Altron Document Solutions Xerox
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleNot even AI can get users excited about Bing
    Next Article OpenRAN and the future of mobile networks

    Related Posts

    Home affairs to roll out restaurant-style self-service kiosks

    6 July 2025

    The real edge in enterprise computing lies in strategic partnerships

    3 July 2025

    South African execs warn: AI projects stalling without strategy

    3 July 2025
    Add A Comment

    Comments are closed.

    Company News

    $125-trillion traded: Binance redefines global finance in just eight years

    11 July 2025

    NEC XON welcomes HPE acquisition of Juniper Networks

    11 July 2025

    LTE Cat 1 vs Cat 1 bis – what’s the difference?

    11 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.