Old Printer Disposal – How Do You Erase Data from a Printer?
Summary: You must erase data from a printer before transferring, recycling or disposing of it. Old printers can hold personal and business data that can be accessed by cybercriminals.
Homes and businesses have all kinds of internet-connected devices. Printers are a frequently used device for residential and office computer systems. But like any computer or other electronic device, printers wear out over time and need to be replaced. Mechanical parts can fail, and circuits short out. Luckily, it is easy to replace a failing printer with a brand-new one. But the bigger question is: How do you safely donate or dispose of the old printer without compromising your data security?
Why You Should Worry About Printer Security
Most users do not think much about printer cyber security or security for other computer peripherals and accessories like webcams or desktop phones. But like other connected devices, they must be included in any cyber assessment and protection plan. Most printers today perform multiple functions such as printing, copying, scanning and faxing, which make them tempting targets for cybercriminals. Think about all the things you have captured on your printer, like scanning your Driver’s License, passport and tax returns. In addition, printers often store passwords, usernames, Social Security numbers, credit card info and other uniquely identifying information for clients, yourself or family members. Hackers also see printers connected to a network as a vulnerable endpoint through which they can launch a variety of cyberattacks, including ransomware and DDoS (Distributed Denial of Service) attacks. Even if you are not disposing of your printer yet, you should be aware of the potential cyber threats to printers:
- Hacking via Wireless Printers – Cybercriminals love wireless connections. Any device connected to your network becomes part of the hacker’s potential target landscape. Printers are usually stationary devices, operating wirelessly, near your computer. Once identified by a bad actor, the printer and all its stored information can be diverted to a malicious network.
- Vulnerable Cloud Printing – Cloud printing is a severe vulnerability because data is put at risk through a public infrastructure. Cloud printing is particularly susceptible to man-in-the-middle attacks and other nefarious methods of hijacking data.
- Print Job Hacking – Cyber thieves can manipulate your print jobs by changing the content to be printed and then clearing the print job logs to remove proof of the hack.
- Unauthorized Access to Print Data and Printer Configuration – Without proper cyber security, anyone given physical access to the printer can steal print data or reroute print jobs by changing the printer’s configuration.
Fortunately, when printer disposal is imminent, there are some ways you can begin to prepare your printer for a “clean break” from your computer system:
- Erase the Hard Drive (if applicable) – Some multi-function printers have hard drives. If a printer has a hard drive, it also has an “Erase Disk” option in its settings.
- Clear All RAM Memory – Even printers without hard drives have small amounts of RAM intended to store data temporarily. You can clear the RAM cache by turning off the printer and unplugging it for a few minutes.
- Destroy Printer’s Hard Drive – If you are disposing of your printer and it has a hard drive, in addition to wiping it clean of data, you should physically destroy the drive. For assistance finding the hard drive for your printer, go to the manufacturer’s website or contact them directly. Once you have removed the drive, you can break it with a hammer. Hit it until you are confident that the inside has been broken into pieces.
- Do Not Forget Memory Cards – Many printers have slots for flash memory drives such as SD cards. Inspect your printer’s various ports to ensure you have removed all flash drives.
- Clear All Direct Email Caches – If you have set your printer to send emails directly from the printer’s control panel, you have probably stored your password in your settings. In general, extra caution should be taken to be sure that none of your credentials are left in any device you are transferring or throwing away.
Many users share printers in office and home settings. However, cyber threats are more significant in the remote access work model because enforcing best practices, especially for printer security, is more complex than ever. Also, home users might not have the tech knowledge required to protect their printers during their operating lifespan. Updating all software is essential to obtain the most up-to-date security patches released by developers. Printing software is no different. By installing all updates, you can reduce the chance of data breaches while operating the printer and after you and your printer have parted ways.
Old Printer Disposal Best Practices
Not everyone has the IT security knowledge to configure, update and dispose of their printers safely. For many, the printer is a peripheral device they set and forget until repair or replacement is required. But when it comes to device security, it is wise to enlist the help of a professional to ensure that printers and other connected office devices are included in the overall network data security plan. Hackers are constantly finding new ways to attack your network and steal valuable client and personal information that can be used to steal directly or sold on the dark web to other criminals. IT experts can help identify your cyber vulnerabilities, provide computer and network support for office or home, help you install and maintain a secure network and, when necessary, assist you with safely wiping data from of all your connected devices before disposal.