How to protect sophisticated printers from breaches