Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security management, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
We are about to scrap several old copy machines. I know they have hard drives in them. Should they be removed, wiped or what are normal company procedures for destroying any potential data on it before decommissioning it.
We need to secure our payroll printer and it's spooled files. Right now anyone is able to view, print or delete reports on this prnter's outq. The payroll person & anyone with SECOFR authority should be the only users with access. How do I set up this type of security? Thank you.