Share on Facebook Share on Twitter Share on Stumble Upon
Copyright © 2013 Parsons Office Systems, Inc. All rights reserved. Usage of this site constitutes acceptance of our   Terms of use | Privacy policy

Servicing Central Texas

      Waco, Temple, Bryan, & Austin

Nationwide support for many products and services

Parsons Office Systems, Inc.  Since 1944
Watch Video

Parsons Office Systems, Inc.




Technology Funnel

Created & Hosted by

Contact Us




Software Solutions

Print Management

Content Management

Document Management

Fax Solutions

Cost Savings


Security - Start here

The Sceptic

CEO or Management

IT-IS-MIS Services


Product Features

Information Content

Connect Key


Samsung Showcase

Everything XEROX

Mailing Equipment


Quick Quote - Copier

Quick Quote - Mailing EQ

Security - CEO or Management

Don’t be the next victim in the newspapers after a network security hack!

Think confidential information is protected by company IT security policies? Think again. A survey commissioned by Xerox and McAfee, reveals that almost two-thirds of U.S. employees never or rarely worry about confidential information remaining secure. See our recent Infographic (see below button) for more details on how safe your office really is.

To address this concern, Xerox and McAfee teamed up to design a security system to help companies protect against threats to this confidential data. By integrating embedded McAfee software into Xerox technology, the two companies will use a whitelisting method that allows only approved files to run, offering significantly more protection than traditional black listing tactics.

Simplistically, think of whitelisting as an approved list of known guests envited to your party, rather than a blacklist of everyone in the entire world not invited to your party.  So, we know exactly what software should be running on your copier/mfp and will be on the pre-approved whitelist.

Infographic think your company is secure?:


Watch both below videos for a better understanding:

3-minutes:  basics of your copier & threats

2-minutes:  your copier is a computer and must be treated as so