Fax Control
Fax machines can present some security problems if they are being used to transmit sensitive information. These vulnerabilities reside throughout the faxing process and include the following:
- When the user feeds the document into the fax machine for transmission, wrongdoers have the opportunity to intercept and decode the information while in transit.
- When the document arrives at its destination, it is typically printed and deposited into a fax tray. Anyone can retrieve the document and review its contents.
- Many fax machine use ribbons. Anyone with access to the trash can retrieve the ribbons and use them as virtual carbon copies of the original documents.
Fax systems can be secured by one or more of the following techniques:
- Fax servers, which can send and receive faxes and then hold the fax in electronic memory. At the recipient's request, the fax can be forwarded to the recipient's email account or can be printed.
- Fax encryption, another technique that gives fax machines the capability to encrypt communications. Fax encryption requires both the transmitting and receiving devices to support a common protocol.
- Fax activity logs, which implement activity logs and exception reports, to monitor for anomalies.
Although fax servers have solved many security problems, they have their own challenges. Many use large hard drives where companies store a large amount of commonly used administrative documents and forms. Others allow ftp access to the print queue, where someone can grab files. These issues must be addressed before effective security can be achieved. |