SHARE
Facebook X Pinterest WhatsApp

Stop the Faxes (from Putting Data at Risk)

Putting protections and policies in place for data at risk in mobile apps and mobile devices and email is high priority for most IT organizations, no matter the size. Let’s face it, you can’t go a day without reading about another threat. And finding the staff and budget for it is relatively easy, given that […]

Written By
thumbnail
Kachina Shaw
Kachina Shaw
Nov 9, 2012

Putting protections and policies in place for data at risk in mobile apps and mobile devices and email is high priority for most IT organizations, no matter the size. Let’s face it, you can’t go a day without reading about another threat. And finding the staff and budget for it is relatively easy, given that accomplishing the goal of data protection coincides with other goals, like monitoring usage and storage needs and keeping productivity up.

But as any good magician knows, it’s what you’re not looking at that might be most surprising in the end. You may not have given faxes any thought for months (years?), but that’s a mistake. Which brings us to those forgotten faxes.

GFI Software and Opinion Matters dug into the topic, and conducted a survey of over 1,000 U.S. office workers on their faxing practices.

The findings will most likely surprise you:

  • 72 percent of surveyed businesses use paper faxes
  • 49 percent of respondents have read a fax intended for someone else
  • 46 percent said they didn’t know whether a document sent over fax is legally binding (it is)

Interestingly, 29 percent said they use faxes because other companies they work with require it and 24 percent said they were required to use faxes by regulation.

Financial, health care and legal organizations may have policies in place addressing faxed materials, along with other modes of communication. If your company doesn’t fall into this group, making a small survey of users on fax use is a smart first step toward assessing your risk.

So, the moral is that newer technologies bring newer threats, but the older ones don’t die. They just get ignored until they come back to bite you — hard. Now, let’s talk about the security of those printers

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
5G and AI: Ushering in New Tech Innovation
Aminu Abdullahi
Apr 14, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.