Terminals as a Trojan horse for hackers
There is no question that the cyber landscape is becoming increasingly complex and diverse. At the same time, companies often forget that printing systems, telephones and multifunction devices must also be integrated into their own IT security strategy.