The Key Point Blog

09/16/2021

Lee Davis

It’s time to secure the goldmine of sensitive information at devices

MFPs are often overlooked when it comes to security measures. This blog explores how the MyQ solution can help to overcome this loophole in many companies' cybersecurity plans.

Read

08/18/2021

Randy Dazo

Keypoint Intelligence to educate on the office and dealers of the future

We may not be able to predict the entire future, but we can help with what we’ve learned from the past, our newest research findings, and involving industry leaders that can all help you see a clearer future for the office and dealers.

Read

07/29/2021

Carl Schell

Industry veteran discusses his vision for product testing and market research organization

Introduced as President and CEO at the beginning of July, Sci has had a potpourri experience in his 30-plus years in the industry. From a services organization (IKON) to manufacturers (Sharp and Xerox) to a dealer (LDI Color ToolBox), he has seen a ton and lived through even more.

Read

10/29/2020

Keypoint Intelligence

This week’s theme: “The Future of Connected Devices”

In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.

Read

10/07/2020

Keypoint Intelligence

This week’s theme: “If You Connect It, Protect It”

For the first week of NCSAM, this blog explores the unknown dangers of smart devices and provides the National Cybersecurity Alliance's "commonsense checklist" of solutions to overcome common weak points.

Read

10/02/2020

Jamie Bsales

Expands successful “bug bounty” program to office-class HP Original Ink and Toner cartridges

HP is expanding its "bug bounty" program to ink and toner cartridges. The company is challenging four professional ethical hackers to identify security vulnerabilities and risks that might be lurking in the firmware found in office-class HP Original Ink and Toner cartridges.

Read

08/27/2020

Keypoint Intelligence

Traditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive

Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.

Read

08/18/2020

Keypoint Intelligence

The Controversy Surrounding TikTok and WeChat

Technology can help us to grow our businesses, educate our children, increase the speed of gathering information, and facilitating important research, but it also puts our personal information at risk. This blog explores these dangers using TikTok and WeChat as examples.

Read

08/06/2020

Keypoint Intelligence

What Print Service Providers Need to Know in Today’s Regulated Business Environment

Worldwide, legislation is being established to protect people's personally identifiable information. This blog explores the attestations and accreditation that PSPs can pursue to protect themselves.

Read

01/02/2020

Keypoint Intelligence

Are You Touched by CCPA?

You might be surprised at how much data is flowing through your company. Accounting data, bank accounts, EDI accounts, names and addresses are all data. In the eyes of the State of California that data is now subject to the California Consumer Privacy Act  (CCPA) and it poses some challenges companies doing business in California, but also companies who do business with constituents in California.

Read