{"id":50446,"date":"2010-05-01T12:00:15","date_gmt":"2010-05-01T16:00:15","guid":{"rendered":"https:\/\/charlesworks.com\/?p=50446"},"modified":"2022-08-23T16:26:25","modified_gmt":"2022-08-23T20:26:25","slug":"copy-machine-security-risks","status":"publish","type":"post","link":"https:\/\/charlesworks.com\/copy-machine-security-risks\/","title":{"rendered":"Copy Machine Security Risks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-50448 aligncenter\" src=\"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg\" alt=\"\" width=\"442\" height=\"193\" srcset=\"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg 442w, https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill-300x131.jpg 300w, https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill-150x65.jpg 150w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/p>\n<p>Modern office copiers can be a security risk. Almost every copier made since 2002 contains a hard drive, which stores a copy of every document the machine scans, prints, copies, or faxes. And if you need proof of just how dangerous this stored information can be, check out the following:<br \/>\n<a href=\"https:\/\/www.cobbtechnologies.com\/blog\/old-copiers-a-security-risk-in-the-making\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cobbtechnologies.com\/blog\/old-copiers-a-security-risk-in-the-making<\/a><\/p>\n<p><strong>So here is a Poll: &#8220;Does your organization wipe data from photo-copier hard drives before copiers are decommissioned?&#8221;<\/strong><\/p>\n<ul>\n<li>Internal staff wipe the data<\/li>\n<li>Third-party IT or copier technicians wipe the data while the machine is on site<\/li>\n<li>Copier dealer or leasing company wipes the data once they reclaim the copier<\/li>\n<li>Copier automatically wipes the data with a built-in feature<\/li>\n<li>We don&#8217;t wipe data from copier hard drives<\/li>\n<\/ul>\n<p><strong>About Bob Hill<\/strong><\/p>\n<p>I began installing and troubleshooting Wang business computers in 1983. I started Hill Specialty Networks after becoming a Novell Certified Network Engineer (CNE) in 1995. My expertise has evolved to meet clients&#8217; needs with Windows Servers from NT4 through Server 2008, PC&#8217;s from Windows 3.0 through Vista, and from the Mac SE through Mac OS-X. The company name changed to Stone Pond Technology in 2008.<\/p>\n<p>Bob Hill<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-50447\" src=\"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhillsm.jpg\" alt=\"\" width=\"119\" height=\"87\"><\/p>\n<p><a href=\"http:\/\/stonepondtechnology.com\">http:\/\/stonepondtechnology.com<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern office copiers can be a security risk. Almost every copier made since 2002 contains a hard drive, which stores a copy of every document the machine scans, prints, copies, or faxes. And if you need proof of just how dangerous this stored information can be, check out the following: https:\/\/www.cobbtechnologies.com\/blog\/old-copiers-a-security-risk-in-the-making So here is a [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[32],"tags":[104,101,99,105,103,100,102,106],"class_list":["post-50446","post","type-post","status-publish","format-standard","hentry","category-technical-help","tag-bob-hill","tag-copiers","tag-copy-machine","tag-hill-specialty-networks","tag-information","tag-office-copiers","tag-security-risk","tag-stone-pond-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Copy Machine Security Risks - CharlesWorks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/charlesworks.com\/copy-machine-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Copy Machine Security Risks - CharlesWorks\" \/>\n<meta property=\"og:description\" content=\"Modern office copiers can be a security risk. Almost every copier made since 2002 contains a hard drive, which stores a copy of every document the machine scans, prints, copies, or faxes. And if you need proof of just how dangerous this stored information can be, check out the following: https:\/\/www.cobbtechnologies.com\/blog\/old-copiers-a-security-risk-in-the-making So here is a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/charlesworks.com\/copy-machine-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"CharlesWorks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CharlesWorksLLC\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-01T16:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-23T20:26:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg\" \/>\n<meta name=\"author\" content=\"Bob Hill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CharlesWorks\" \/>\n<meta name=\"twitter:site\" content=\"@CharlesWorks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/\"},\"author\":{\"name\":\"Bob Hill\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#\\\/schema\\\/person\\\/8b14de3ec7c626ac149c552f3f5dbd50\"},\"headline\":\"Copy Machine Security Risks\",\"datePublished\":\"2010-05-01T16:00:15+00:00\",\"dateModified\":\"2022-08-23T20:26:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/\"},\"wordCount\":197,\"publisher\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/bobhill.jpg\",\"keywords\":[\"Bob Hill\",\"Copiers\",\"Copy Machine\",\"Hill Specialty Networks\",\"Information\",\"Office Copiers\",\"Security Risk\",\"Stone Pond Technology\"],\"articleSection\":[\"Technical Help\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/\",\"url\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/\",\"name\":\"Copy Machine Security Risks - CharlesWorks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/bobhill.jpg\",\"datePublished\":\"2010-05-01T16:00:15+00:00\",\"dateModified\":\"2022-08-23T20:26:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/bobhill.jpg\",\"contentUrl\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/bobhill.jpg\",\"width\":442,\"height\":193,\"caption\":\"Bob Hill - Stone Pond Technology Computer and Network Consulting logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/copy-machine-security-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/charlesworks.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Copy Machine Security Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#website\",\"url\":\"https:\\\/\\\/charlesworks.com\\\/\",\"name\":\"CharlesWorks\",\"description\":\"Web Development - Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/charlesworks.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#organization\",\"name\":\"CharlesWorks\",\"url\":\"https:\\\/\\\/charlesworks.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo-for-localshopper.png\",\"contentUrl\":\"https:\\\/\\\/charlesworks.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo-for-localshopper.png\",\"width\":540,\"height\":110,\"caption\":\"CharlesWorks\"},\"image\":{\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CharlesWorksLLC\",\"https:\\\/\\\/x.com\\\/CharlesWorks\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/charlesworks.com\\\/#\\\/schema\\\/person\\\/8b14de3ec7c626ac149c552f3f5dbd50\",\"name\":\"Bob Hill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g\",\"caption\":\"Bob Hill\"},\"sameAs\":[\"http:\\\/\\\/stonepondtechnology.com\"],\"url\":\"https:\\\/\\\/charlesworks.com\\\/author\\\/bobhill\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Copy Machine Security Risks - CharlesWorks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/charlesworks.com\/copy-machine-security-risks\/","og_locale":"en_US","og_type":"article","og_title":"Copy Machine Security Risks - CharlesWorks","og_description":"Modern office copiers can be a security risk. Almost every copier made since 2002 contains a hard drive, which stores a copy of every document the machine scans, prints, copies, or faxes. And if you need proof of just how dangerous this stored information can be, check out the following: https:\/\/www.cobbtechnologies.com\/blog\/old-copiers-a-security-risk-in-the-making So here is a [&hellip;]","og_url":"https:\/\/charlesworks.com\/copy-machine-security-risks\/","og_site_name":"CharlesWorks","article_publisher":"https:\/\/www.facebook.com\/CharlesWorksLLC","article_published_time":"2010-05-01T16:00:15+00:00","article_modified_time":"2022-08-23T20:26:25+00:00","og_image":[{"url":"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg","type":"","width":"","height":""}],"author":"Bob Hill","twitter_card":"summary_large_image","twitter_creator":"@CharlesWorks","twitter_site":"@CharlesWorks","twitter_misc":{"Written by":"Bob Hill","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#article","isPartOf":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/"},"author":{"name":"Bob Hill","@id":"https:\/\/charlesworks.com\/#\/schema\/person\/8b14de3ec7c626ac149c552f3f5dbd50"},"headline":"Copy Machine Security Risks","datePublished":"2010-05-01T16:00:15+00:00","dateModified":"2022-08-23T20:26:25+00:00","mainEntityOfPage":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/"},"wordCount":197,"publisher":{"@id":"https:\/\/charlesworks.com\/#organization"},"image":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg","keywords":["Bob Hill","Copiers","Copy Machine","Hill Specialty Networks","Information","Office Copiers","Security Risk","Stone Pond Technology"],"articleSection":["Technical Help"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/","url":"https:\/\/charlesworks.com\/copy-machine-security-risks\/","name":"Copy Machine Security Risks - CharlesWorks","isPartOf":{"@id":"https:\/\/charlesworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg","datePublished":"2010-05-01T16:00:15+00:00","dateModified":"2022-08-23T20:26:25+00:00","breadcrumb":{"@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/charlesworks.com\/copy-machine-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#primaryimage","url":"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg","contentUrl":"https:\/\/charlesworks.com\/wp-content\/uploads\/2020\/06\/bobhill.jpg","width":442,"height":193,"caption":"Bob Hill - Stone Pond Technology Computer and Network Consulting logo"},{"@type":"BreadcrumbList","@id":"https:\/\/charlesworks.com\/copy-machine-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/charlesworks.com\/"},{"@type":"ListItem","position":2,"name":"Copy Machine Security Risks"}]},{"@type":"WebSite","@id":"https:\/\/charlesworks.com\/#website","url":"https:\/\/charlesworks.com\/","name":"CharlesWorks","description":"Web Development - Web Services","publisher":{"@id":"https:\/\/charlesworks.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/charlesworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/charlesworks.com\/#organization","name":"CharlesWorks","url":"https:\/\/charlesworks.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/charlesworks.com\/#\/schema\/logo\/image\/","url":"https:\/\/charlesworks.com\/wp-content\/uploads\/2019\/10\/logo-for-localshopper.png","contentUrl":"https:\/\/charlesworks.com\/wp-content\/uploads\/2019\/10\/logo-for-localshopper.png","width":540,"height":110,"caption":"CharlesWorks"},"image":{"@id":"https:\/\/charlesworks.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CharlesWorksLLC","https:\/\/x.com\/CharlesWorks"]},{"@type":"Person","@id":"https:\/\/charlesworks.com\/#\/schema\/person\/8b14de3ec7c626ac149c552f3f5dbd50","name":"Bob Hill","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c3b7d660d98c90d0c1e511634b849cf330318c519d092584751a172c41505d6?s=96&d=mm&r=g","caption":"Bob Hill"},"sameAs":["http:\/\/stonepondtechnology.com"],"url":"https:\/\/charlesworks.com\/author\/bobhill\/"}]}},"_links":{"self":[{"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/posts\/50446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/comments?post=50446"}],"version-history":[{"count":0,"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/posts\/50446\/revisions"}],"wp:attachment":[{"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/media?parent=50446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/categories?post=50446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/charlesworks.com\/wp-json\/wp\/v2\/tags?post=50446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}