Saltar a contenido principalHaga clic para ver nuestra Declaración de accesibilidad o contáctenos si tiene preguntas relacionadas con la accesibilidad.

Laptop monitor with text that says "Privacy Settings"

Simple safeguards to stay secure in today’s world.

illustration of a clipboard with check marks

Every day we hear about another hack or security attack. Sadly, identity theft and data breaches are not just things that happen to other people or other businesses. Get up to speed on the risks and the easy, simple steps you can take to safeguard yourself and your business.

illustration of a of a thief with sunglasses and a hat

Are you as secure as you think?

When was the last time you changed your computer/device passwords? Do you have a different password for each? And what about your printer – is it secure?

It may be hard to believe but less than 2% of printers in use today are intrusion-proof. Most people do not change the default password at installation, giving hackers easy access to embedded system data, network information, and even the ability to download files to the printer.

The key is to think of all of your devices at home and at work as mini computers:

  • Change the default password immediately upon printer installation and use complex, lengthy passwords

  • Ensure your printer has the latest security features such as offered by Xerox® ConnectKey® Technology

  • Make passwords different for every device you use including each app or website login

  • Don’t forget to update your passwords regularly

Looking for a secure printer? You’re going to want to check out the Xerox® VersaLink® C405 Color Multifunction Printer.

illustration of a icon for mobile security

Take your security with you

Think about all the information available on your phone—contacts, texts, emails, stored logins for social media, banking details and more. In addition to strong passwords, you can guard against data invasion with:

  • Turn off sharing—Turn off WI-FI, Bluetooth and GPS when not in use to limit your “detectability” by hackers. And be careful when connecting to public networks.

  • Keep your software updated—Update your desktop and mobile antivirus software regularly and check in with your company about your work phone’s Mobile Device Management Software. Be extra careful whenever downloading software from the web – especially on any work devices.

  • Save data securely—Save and backup data to the cloud or a secure server, never your device. 

illustration of an icon with magnifying glass and bug

Add more peace of mind with these protective steps for your computer:

  • Ensure hard drives are secure—Make sure any information that is on a hard drive is encrypted. This not only guards against attacks, but can be helpful for recovery if you need it.

  • Protect against SPAM and viruses—Make sure you - and your employees know how to detect and deal with suspicious emails so you avoid viruses.

  • Purge old files regularly—Archives are important but avoid the urge to be an electronic packrat. Know what to delete and when—and do it regularly.

  • Consider your trash—Leverage trade-in programs for proper disposal of obsolete technology (such as computers, printers and hard drives) to ensure these items do not get harvested for sensitive information. 

illustration of an icon of a keylock

Does your printer security walk the talk?

There’s a lot of talk in office technology circles about who provides the most secure products. Proof of superior security is in the Xerox platform.

Xerox® VersaLink® C405: Cuente con él YouTube Video

Xerox makes security a top priority because we know it needs to be for you and your business. Every Xerox® ConnectKey® Technology-enabled device such as the VersaLink C405 Color all-in-one printer is armed with a comprehensive four-point approach to printer security to prevent intrusion.

Trellix Embedded Security powered by Intel Security lets you connect safely with your ConnectKey printers and multifunction printers so you can protect them the way you shield your PCs from viruses and malware.

illustration of an icon showing paper with keylock

Treat your printed documents sensitively:

Because your printer is on your network, it can be an entry point for people looking to steal your information. Follow the steps above to secure your network but go one step further and protect your printer too:

  • Abandoned Documents—Don’t leave documents sitting in the printer input or output trays – use secure print technology that safely stores the document at the device until you are there to release the job and collect it. And if you do print sensitive material, don’t throw it in the trash, send it to the shredder ASAP.

  • App Availability—Control what apps can be accessed from your multifunction printer with Xerox® ConnectKey® Technology that lets you whitelist / allow list trusted apps.

  • Data on Printer Hard Drives—Your printer has a hard drive too. Make sure it is encrypted and your printer scrubs data after printing documents.

  • Scanned Data—Scanned data can live on your network. Leverage technology that automatically deletes this information after a scanned document is emailed, stored or printed.

  • Printer and Document Access—Many printers today  are embedded with technology that allows you to control who has what type of access. This not only secures sensitive data but can save you money by reducing wasteful printing.

Learn more about the importance of document security.

Xerox printer security measures protect you and your business every day so you can go about your life. Take the time to perform preventative steps and you’ll be safe and sound instead of sorry.

Not sure if you are secure?

Find out more or .

* Trellix se conocía antes como McAfee

Man looking between the shelves in a secure server room

Seguridad de impresión avanzada

Confíe en la seguridad integral de ConnectKey para proteger sus datos y documentos confidenciales. 

Xerox VersaLink C405 touchscreen interface

Impresora multifunción color Xerox® VersaLink® C405

Asistente inteligente en el trabajo con la tecnología Xerox® ConnectKey®

Artículos relacionados

  • Man sitting at desk on laptop.

    Caso de estudio Bell Law

    Descubra cómo un importante bufete de abogados laboralistas superó los obstáculos de procesamiento e intercambio de documentos con las innovadoras soluciones que ofrece Xerox® Workflow Central.

  • Children sitting at table with teacher working on computers

    Caso de estudio: Modernización de la comunicación en las escuelas

    Cómo en California mejoró la comunicación en escuelas, empleados, alumnos y padres con Xerox Workflow Central y una biblioteca en la nube de flujos de trabajo simples y de varios pasos para traducir, convertir en audio, editar y resumir información, y más.

  • Students working at a table

    El proveedor de formación innova en la forma de impartir el aprendizaje, logrando que los contenidos sean más accesibles.

    La plantilla de formación de CRC Formation utiliza Xerox® Workflow Central para ofrecer a los estudiantes nuevas formas de aprender.

  • Woman holding blue toner cartridge

    La falsa economía del tóner barato

    Lo que no sabes es que el tóner barato te costará más a largo plazo.

  • Woman changing Xerox printer toner

    How to Check Your Printer Toner Level – 5 Easy Ways

    Running out of toner slows down productivity for the whole office. Here are 5 simple methods to check the toner level on your Xerox printer.

  • Doctor examining a child

    French Non-Profit Association Case Study

    See how Xerox helped boost productivity and accessibility for one of France's most significant non-profit organizations with the help of our Managed Print Services and Workflow Central Platform.