|
      0KCF-084
      Security
      Confidential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your confidential information is leaked. To counter these risks, the machine is equipped with a variety of security functions. Set the necessary configuration depending on your network environment.
      NOTE
      You can configure the best security system by building an environment that inhibits access to printers on your in-house network via the Internet and using such environment together with the machine's security features. Preventing Unauthorized Access
      Establishing the Basics of Information Security
      Preparing for Risks from Negligence or Misuse
      Implementing Robust Security Features