Information Security

  • Permalink Gallery

    How Small and Mid-Size Businesses Improve Security with Cloud and Network Print Solutions

How Small and Mid-Size Businesses Improve Security with Cloud and Network Print Solutions

By |Feb 6, 2017|

Ask most small- to medium-sized business (SMB) owners and managers about their top concerns and you’ll typically hear answers along the line of “money,” “efficiency” and “security.”

5 Ways You Need to Secure your Small Business in 2017

By |Jan 26, 2017|

Printers aren’t typically the first place business owners look to when considering how best to secure their businesses and that’s probably because computer breaches tend to get the most press. Printers (and their scanners) are part of your business arsenal of resources, so it’s important to put security measures in place.

  • Permalink Gallery

    From Mobility to Security: The Top 3 Challenges Facing SMBs Today

From Mobility to Security: The Top 3 Challenges Facing SMBs Today

By |Dec 26, 2016|

Xerox recently collaborated with third party research firm Coleman Parkes to survey more than 1,000 companies in the United States, United Kingdom, France and Germany to learn more about their unique challenges, and to better spot opportunities in the making. The respondents ranged from operations managers, IT managers and owners to CTOs, painting a clear picture of the critical needs of today’s SMB.

  • Permalink Gallery

    Easily Share Patient Files from Healthcare MFP with HIPAA-Compliant Data Exchange

Easily Share Patient Files from Healthcare MFP with HIPAA-Compliant Data Exchange

By |Dec 12, 2016|

The Healthcare MFP, connected by Kno2™, was designed especially with healthcare providers in mind, offering not only the fulfillment of administrative tasks, but also the brokering of secure transmissions of Protected Health Information (PHI).

  • Permalink Gallery

    Part III Security: Tips for Protecting Smart Printers from Today’s Security Threats

Part III Security: Tips for Protecting Smart Printers from Today’s Security Threats

By |Nov 14, 2016|

The first step to ensure you limit your risk by ensuring your devices are integrated and managed as part of your IT infrastructure.