Network Security in the Age of IoT
In today’s digital age, where data security is a paramount concern for businesses, protecting printers and other company network devices within the organization’s communication infrastructure is a critical focus. Networked devices embedded with sensors, software, and communication technologies connect and exchange information with other devices over the internet. Over 7 billion connected Internet of Things (IoT) devices exist today. They include smartphones, TVs, refrigerators, medical devices, home and office security, baby monitors, thermostats, telephones, vehicles, and office equipment. Modern society depends on these IoT devices, and businesses and organizations rely on these devices. This article will examine the top-selling network office printers for printer cybersecurity and rank order the printers with the lowest exposure to unauthorized access.
Network Printers – the Initial Attack Vector
Connected devices to company networks and the internet are “baked into” our daily routines. Digital security, physical security, financial security, business identities, and individual identities meld together into a collective vulnerability.1 Cyberattacks using automated artificial intelligence systems further exacerbate the problem.2 Networked printers are a significant exploitable pathway for cyberhackers to access otherwise secure networks.3 Modern printers are the initial attack vector for many hackers attempting to breach an organization’s network because they are traditionally a weak link. Since cybercriminals target networks that are the easiest to exploit, according to the FBI,4 it makes sense to purchase network printers that offer the best security protection from unauthorized users.
Why Do Cybercriminals Select Printers When Hacking Networks?
From the viewpoint of cybercriminals, business printers are the gateway to an organization’s network. Printers tend to receive the least amount of attention when it comes to network security, making them low hanging fruit for cyberattacks. Cybercriminals will seek the path of least resistance to gain entry to company networks. Office printers with little protection and known vulnerabilities are ripe for hacking.
Disadvantages of Vulnerable Printer Security
Printer network security focuses on preventing cyber threats and issues affecting businesses with unsecured copiers. A printer cybersecurity event can produce the following results for an organization:
- Financial Loss
- Loss of customer database
- Transaction records loss
- Employee data loss
- Identity theft
- Regulatory noncompliance
- Loss of company trade secrets to competitors
- Loss of productivity
- Customer lawsuits
- Unauthorized use of equipment and network resources
- Some thriving companies failed and are no longer in business as a result of a cyberbreach
Advantages of Printer Cybersecurity
Printer network security brings many benefits to organizations. Listed below are some of the perks of a viable printer cybersecurity plan.
- Organizational data protection
- Preventing unauthorized access
- Protecting networked devices
- Safeguarding company network security
- Compliance with regulatory requirements
- Reducing potential attacks (cyber attacks, phishing attacks, service attacks, document theft,
- Audit trails and monitoring
- Foster 3rd-party trust
- Mitigate loss
- Reduce cybersecurity insurance costs
- Meeting compliance requirements
How to Select the Best Cybersecure Printer
With an array of printer brands available in the market, discerning the most cybersecure models can be challenging. We meticulously evaluated and ranked the top printers from leading brands to simplify this decision-making process based on their cyberattack vulnerability. Unlike many product rankings on the internet with baseless rank orders and links to affiliate websites for monetarization, this printer ranking uses data collected from government-sanctioned websites. These unaffiliated websites list cybersecurity vulnerabilities and exposures (CVE) of IoT devices to cybercriminals. This information comes from organizations that are not benefiting from manufacturers. These organizations do not benefit by skewing figures to favor a particular manufacturer. Instead, the sources are government-sponsored and endorsed to help organizations improve printer network security. Examining brands of printers with measurable data for their past and current vulnerabilities is a better measurement of security than rankings without any analytical data.
Printer Cybersecurity
Not all office printers are alike. Some manufacturers extensively research networked printers’ vulnerabilities and develop safeguards to help prevent a cyberbreach. Manufacturers focusing on developing printers for businesses, enterprises, and respected organizations, rather than concentrating on price-conscious consumers, tend to manufacture the best printers to combat cybersecurity. Companies like Brother, Kyocera, Ricoh, Sharp, and Xerox invest heavily in securing their print devices. The tabular data below provides evidence of print manufacturer efforts toward network security.
Our Method of Ranking
To determine which network printers offer the best cybersecurity functions out-of-the-box, we will use the registrar from the National Vulnerability Database and CVE details to evaluate the security track record for the top brands of office printers. CVE is a registered trademark of the MITRE Corporation. The U.S. Department of Homeland Security (DHS) sponsors the CVE and the Common Weakness Enumeration (CWE) programs.5 The CVE Program seeks “to identify, define, and catalog publicly disclosed cyber security vulnerabilities.”6
Our evaluation and ranking will initially use three measurements. These measurements use objective data and subjective classification. Together, they help ascertain the best secure printers for office networks.
3 Tests for Printer Security Vulnerabilities
- Common Vulnerabilities and Exposure (CVE)
- The Common Vulnerability Scoring System (CVSS)
- The Exploit Prediction Scoring System (EPSS)
#1 CVE: Measuring Vulnerability and Exposure
The CVE measurement evaluates the history of common cybersecurity vulnerabilities and exposure (CVE). We examined each brand’s exploitable history over the past 11 years from CVE reports of the vulnerability of their office devices. This objective measurement is the total number or sum of all identified vulnerabilities for the brand. We then drill down to examine the vulnerabilities logged only during 2023 from January 1 through November 14. The tally for 2023 tells us something about a manufacturer’s attention to detail in removing all of the previous years of CVEs and protecting against foreseeable security vulnerabilities. Accurately forecasting security issues and protecting against them is the hardest part of cyber safety to prevent unauthorized access. We tallied the number of vulnerabilities by brand, adding them to a comparison chart for a side-by-side analysis.7
#2 CVSS: Measuring Severity of Vulnerability
Not all vulnerabilities are equal. Some are critical, while others offer limited or low exposure. Each vulnerability receives a numeric score for its severity level between 0 and 10. 10 represents the highest severity level, while 0 represents zero severity. The severity level assignment is somewhat subjective, but it is vital to prioritize which vulnerabilities need to be dealt with expeditiously. In ranking the top printers for the best security, the CVSS score is a significant factor. There are four levels of severity—Low, Medium, High, and Critical. A “Critical” rated printer is more prone to unauthorized access and a costly cybersecurity breach. Below is a chart depicting the severity levels derived from their CVSS score.
CVSS Score | Severity Level |
---|---|
0.1 to 3.9 | Low |
4.0 to 6.9 | Medium |
7.0 to 8.9 | High |
9.0 to 10.0 | Critical |
#3 EPSS: Measuring the Probability of Exploitation
EPSS provides efficient, data-driven vulnerability management. This open, data-centric initiative utilizes current threat information from CVE and real-world exploit data. The EPSS model generates a probability score based upon a percentage between 0 and 1 (or 0% and 100%), where a higher score or percentage signifies an increased likelihood of a vulnerability to exploitation.8
Leveraging EPSS for Enhanced Vulnerability Management
EPSS evaluates the probability of exploitation activity, constituting just one facet in a risk-based approach to vulnerability management. Consequently, EPSS is not a standalone risk score. Factors like the accessibility of vulnerable assets to attackers, the nature of the vulnerability’s weakness, and the asset’s purpose and value, among others, warrant consideration when prioritizing which vulnerabilities necessitate attention.
EPSS exclusively relates to the threat component. Organization managers must factor in numerous aspects of the network vulnerability, their network access, and the network devices before deciding whether to remediate or postpone remediation. Nonetheless, a lower EPSS score should signify a reduced threat score (EPSS never reaches zero), thus potentially lowering the overall risk when other variables remain constant. Risk analysis is undeniably intricate. EPSS provides an additional assessment within the comprehensive landscape of organizational networks to help make the best purchase decisions.
Top Cybersecurity Printers from 11-Years of CVE Rankings
Brand | # CVEs (Since 2013) |
---|---|
Sharp | 16 |
Brother | 20 |
Kyocera | 27 |
Epson | 30 |
Ricoh | 43 |
Canon | 60 |
Lexmark | 66 |
NEC | 99 |
Xerox | 103 |
HP | 2223 |
Top Network Printers for Security over the past 11-Years CVE Rankings
The chart above displays the total number of CVEs each printer brand accumulated over 11 years, from 2013 to November 15, 2023. This study examines each brand’s historical record of security vulnerabilities. This comparison helps identify companies working hard at printer security for the long haul. Printer security is not a one-time event but a year-to-year endeavor. Sharp Electronics leads with only 16 CVEs, or an average of 1.2 per year. Kyocera, Brother, Xerox, and Ricoh rank well on this chart, each achieving below 50 total CVEs. Each company consistently focuses on network security for their out-of-the-box printers.
Hewlett Packard (HP), at the bottom of the list, is the highest-ranking seller of printers by sales volume worldwide. The design of many HP printers targets the consumer market with low-priced printer models designed for the home market. These lower-priced models contribute significantly to the number of identified vulnerabilities experienced by HP. Their business-class printers, however, offer more robust cybersecurity features than their low price consumer models.
Top Cybersecurity Printers by CVE Rankings for 2023
Brand | # CVEs (Jan 1 – Nov 15, 2023) |
---|---|
Sharp | 0 |
Brother | 2 |
Ricoh | 2 |
Xerox | 2 |
Epson | 3 |
Kyocera | 4 |
NEC | 6 |
Lexmark | 11 |
Canon | 15 |
HP | 96 |
Top Printers for Security in 2023 by CVE Rankings
The chart above ranks the top 10 printer brands for office equipment during January through November 15, 2023. The best ranking brands begin at the top and the lowest at the bottom. The brands are rank-ordered by the number of CVEs or security faults discovered so far during 2023. The chart shows Sharp leading with zero security issues for vulnerabilities or exposures in 2023. In 2022, Sharp experienced 2 CVEs and as mentioned in the preceding section, Sharp had only 16 total during the past eleven years. Other noteworthy brands with low identified security exposures include Kyocera with 1 CVE, Brother with 2 CVEs, Ricoh with 2 CVEs, and Xerox with 2 CVEs so far during 2023. These five brands exhibit attention to detail regarding network security and preventing unauthorized network access.
Top Cybersecurity Printers by CVSS Rankings in 2023
Brand | Average CVSS (Severity) |
Average Severity |
---|---|---|
Sharp | 0 | Low |
Brother | 5.4 | Medium |
NEC | 5.5 | Medium |
Kyocera | 5.8 | Medium |
Xerox | 6.2 | Medium |
Epson | 6.3 | Medium |
HP | 8.0 | High |
Canon | 8.4 | High |
Ricoh | 8.5 | High |
Lexmark | 9.2 | Critical |
Top Network Printers for Cybersecurity by CVSS Rankings
The chart above displays the average severity level for printer vulnerabilities in 2023 (Jan. – November 15) listed by brand and rank-ordered from best at the top. Sharp is the only manufacturer to achieve the “Low” severity level. Two manufacturers ranked for High severity levels.
Best Printers for Security by EPSS Ranking in 2023
Brand | Average EPSS (Probability) |
---|---|
Sharp | 0 |
NEC | 4.8% |
Brother | 5.5% |
Xerox | 5.5% |
Ricoh | 6.5% |
Epson | 6.7% |
HP | 10.0% |
Canon | 16.5% |
Kyocera | 26.5% |
Lexmark | 181.7% |
Rankings for Least Vulnerable Printer for Security Exploitation
As mentioned previously, EPSS measures the probability of exploitation. The EPSS ratings above place Sharp with the best average score of zero probability. Sharp printer products offer the safest option for top-grade security features to protect office networks. NEC follows Sharp with an average probability of 4.8%. Brother and Xerox, both with a probability score of 5.5%, tie for third. Lexmark occupies the last position with an average probability of 181.7%.
This article researches and ranks the top selling printers by their level of network security exposure. The rankings examined the following elements: 1) the number of vulnerabilities identified for each brand so far during 2023 (CVE), 2) the average severity level for the vulnerabilities discovered (CVSS), and 3) the average probability of exploitation (EPSS). Sharp printers have the lowest number of vulnerabilities, even when looking back 13-years. Sharp has the lowest severity level for known vulnerabilities. Lastly, Sharp has the best probability of not being hacked by a cybercriminal. How does sharp do it? Sharp employs BIOS integrity checks upon startup, firmware attach prevention, TLS 1.3 encryption, intrusion detection, and offers an optional Bitdefender antivirus protection. Layers of security protect Sharp printers from cyber intrusions. Below is a consolidated comparison table of each measurement and links to the data source. The rank order for this comparison is by CVSS.
Printer Security Comparison Table – Side-by-Side Analysis
Brand | # CVEs Jan 1 – Nov 15, 2023 |
Average CVSS (Severity) |
Average CVSS (Severity Classification) |
Average EPSS (Probability) |
Source |
---|---|---|---|---|---|
Sharp | 0 | 0 | Low | 0 | Sharp CVE Analysis |
Brother | 2 | 5.4 | Medium | 5.50% | Brother CVE Analysis |
NEC | 6 | 5.5 | Medium | 4.83% | NEC CVE Analysis |
Kyocera | 4 | 5.8 | Medium | 26.50% | Kyocera CVE Analysis |
Xerox | 2 | 6.2 | Medium | 5.50% | Xerox CVE Analysis |
Epson | 3 | 6.3 | Medium | 6.67% | Epson CVE Analysis |
HP | 96 | 8.0 | High | 9.67% | HP CVE Analysis |
Canon | 15 | 8.4 | High | 16.47% | Canon CVE Analysis |
Ricoh | 2 | 8.5 | High | 6.50% | Ricoh CVE Analysis |
Lexmark | 11 | 9.2 | Critical | 181.73% | Lexmark CVE Analysis |
FREE Self Assessment of Your Network Printers
Sharp Printer Security
Sharp manufacturers printers designed to serve organizations, businesses, and enterprises with top-tier security right out-of-the-box. These business-class printers incorporate years of research, experimentation, and testing. Sharp Offers 15 Printer Security Features to protect your organization’s data. Sharp printers repeatedly outperform its competition for maintaining network security. Find out more about Sharp Printers and Copiers and checkout our Comprehensive Guide about Printer Cybersecurity.
Footnotes
- 1 Pomerleau, Pierre-Luc, and David L. Lowery. “Countering Cyber Threats to Financial Institutions.” A Private and Public Partnership Approach to Critical Infrastructure Protection. Springer, 2020. Accessed 15 Nov. 2023. link.springer.com/book/10.1007/978-3-030-54054-8
- 2 Durnyak, Bohdan, Petro Shepita, and Lyubov Tupychak. “Protection of the Information System of the Printing Enterprise from Cyber Threats.” CEUR-WS. 3373-31. Accessed 13 Nov. 2023. ceur-ws.org/Vol-3373/paper31.pdf
- 3 Sulaiman, Fajar Subkhi, Henki Bayu Seta, and Noor Falih. “Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense.” 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS. IEEE, 2021. Accessed 13 Nov. 2023. ieeexplore.ieee.org/abstract/document/9699133
- 4 Christopher Wray. The FBI and the Private Sector: Battling the Cyber Threat Together. Federal Bureau of Investigation. January 28, 2021. Accessed 16 Nov 2023. www.fbi.gov/news/speeches/the-fbi-and-the-private-sector-battling-the-cyber-threat-together-012821
- 5 Kent, K. Quinn, S. and Mell, P. The Security Content Automation Program (SCAP): Automating Compliance Checking, Vulnerability Management, and Security Measurement. National Institute of Standards and Technology. U.S. Department of Commerce. (2006). p. 1. Accessed 15 Nov 2023. csrc.nist.gov/CSRC/media/Projects/Security-Content-Automation-Protocol/documents/docs/scap-nistir-7343.pdf
- 6 Snapshot: Top 25 Most Dangerous Software Errors. Department of Homeland Security. November 26, 2019. Accessed 15 Nov. 2023. www.dhs.gov/science-and-technology/news/2019/11/26/snapshot-top-25-most-dangerous-software-errors
- 7 Overview About the CVE Program. CVE.org. Accessed 15 Nov. 2023. www.cve.org/About/Overview
- 8 Exploit Prediction Scoring System (EPSS). (n.d.). FIRST — Forum of Incident Response and Security Teams. Accessed 22 Nov 2023. www.first.org/epss/