VIDEO

Printer Problems: Trump, Putin, and a Costly Mistake

Video Summary:
On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery.  But the real story isn’t just about geopolitics. It’s about how unmanaged printers—at hotels, in home offices, and everywhere in between—remain one of the most overlooked backdoors for data leaks. In this episode of Cyberside Chats, Sherri and Matt unpack the Alaska incident, explore why printers are still a weak spot in the age of remote and traveling workforces, and share practical steps to secure them.  Key Takeaways for Security & IT Leaders  1. Reduce reliance on unmanaged printers by promoting secure digital workflows. Encourage employees to use e-signatures and encrypted file sharing instead of printing.  2. Update remote work policies to cover home and travel printing. Most organizations don’t monitor printing outside the office—explicit rules reduce blind spots.  3. Require secure wiping or destruction of printer hard drives before disposal. Printers retain sensitive files and credentials, which can walk out the door if not properly handled.  4. Implement secure enterprise printing with authenticated release and HDD encryption. Treat printers as endpoints and apply the same safeguards you would for laptops. 5. Train employees to recognize that printers are data risks, not just office equipment. Awareness helps prevent careless mistakes like walk-away leaks or using hotel printers.  Resources  • NPR: Trump–Putin Summit Documents Left Behind in Anchorage Hotel Printer (2025) (https://www.npr.org/2025/08/16/nx-s1-5504196/trump-putin-summit-documents-left-behind)   • Dark Reading: “Printers’ Cybersecurity Threats Too Often Ignored” (https://www.darkreading.com/endpoint-security/printers-cybersecurity-threats-too-often-ignored)    • LMG Security: “Work from Home Cybersecurity Checklist” (https://www.lmgsecurity.com/the-coronavirus-work-from-home-cybersecurity-checklist-for-executives-it-remote-employees)  
CONTACT US