Security related to Canon products

August 3, 2015
Canon. Inc.

With the popularization of the Internet and wireless LAN technology, a diverse range of electronic devices are now capable of connecting to a network, enabling the remote operation of various functions.

By connecting to a network, however, information devices can become vulnerable to unauthorized third-party access, which could lead to such security issues as the unauthorized usage of the device.

To minimize the likelihood of such issues, devices must make use of proper settings and be used in a secure environment.

To help ensure that our customers can use Canon products with peace of mind, we recommend that users implement the following security measures.

Security measures when using Canon products

Select an administrator ID and password

In order to strengthen the security of your Canon product, please select an administrator ID and password. By requiring user authentication, administrators can limit access to a multifunction printer and/or specify which functions are made available to each user, helping to prevent unauthorized operations and protect digital data on the machine’s internal disk drive.

Use a private IP address

Please use a private IP address when setting up your IP address. The use of a public IP address may increase the possibility of the device being accessed by an unauthorized third party.

Install a firewall (using a router, etc.)

To help prevent unauthorized users from accessing your Canon product, please establish a secure usage environment when connecting your device to a network, such as by installing a firewall.

Encrypt communications

To protect your communications, please set up an encryption method based on your usage environment. Based on the encryption settings used, you can achieve a higher level of security that greatly reduces the possibility of third parties intercepting your communications.

Additional information

Information regarding security measures for specific Canon products and their set-up procedures are outlined below.