Printers
Cybersecurity statistics about printers
Top Vendors
Showing 1-17 of 17 results
More than half (51%) of IT and security decision-makers cannot confirm if a printer has been tampered with in the factory or in transit once it arrives.
36% of IT and security decision-makers apply firmware updates promptly during the Ongoing Management stage.
IT teams spend 3.5 hours per printer per month managing hardware and firmware security issues.
On average, IT and security decision-makers report having approximately 80 printers that are redundant or are in the process of being decommissioned within their organizations.
35% of IT and security decision-makers are uncertain whether printers can be fully and safely wiped using current sanitisation solutions.
86% of IT and security decision-makers say data security is a barrier to printer reuse, resale, or recycling.
1-in-10 (10%) of IT and security decision-makers insist on destroying both the device and its storage drives to ensure data security.
Only 32% of IT and security decision-makers can detect security events linked to hardware-level attacks.
60% of IT and security decision-makers warn that a lack of collaboration between procurement, IT, and security puts their organization at risk.
1-in-4 (25%) of IT and security decision-makers believe it’s necessary to physically destroy printer storage drives.
54% of IT and security decision-makers fail to request technical documentation to validate security claims.
55% of IT and security decision-makers fail to submit vendor responses to security teams for review.
Only 38% of IT and security decision-makers say procurement, IT, and security collaborate to define printer security standards during the Supplier Selection & Onboarding stage.
42% of IT and security decision-makers fail to involve IT/security teams in vendor presentations.
Only 35% of IT and security decision-makers are able to identify vulnerable printers based on newly published hardware or firmware vulnerabilities.
Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams.
70% of IT and security decision-makers are increasingly worried about offline threats, such as employees printing and mishandling sensitive company information.