Creating a Secure Fax Infrastructure
It is important to note that in a perfect world, every fax machine will be deployed with the highest levels of security. In the real-world, such an approach is not practical.
Computer security is simply attention to detail and good design and effective information security is built on risk management, good business practices and project management. Creating a secure fax infrastructure is no different.
The initial step of this infrastructure is to establish policies around the use of fax machines. The ultimate level of fax security is built on this foundation of effective policies and procedures which govern their use. At the end of this article is a set of core policies around fax security that can be used.
While the basic use of a fax machine is often intuitive; the secure use of a fax machine is often not so intuitive. By creating a set of standard operating procedures (SOP) around the use of secure faxes, you can mitigate most of the threats involved.
Some of the basic procedures around fax security include ensuring the number of pages of the fax received are the same amount sent, reassembling the received document, appropriate distribution, confirmation of receipt, and more.