But you should. Oh boy, should you ever. And do a little research before you buy, too. It turns out that even today, some print manufacturers disallow the ability to change SNMP community strings. Somebody gets access to that and they have limited read/write access to the SNMP server. You can play some great practical jokes that way, but you can also use it as a staging point to map out the rest of the network, gather default passwords, and open ports — the usual penetration drill. Using other aspects of the printer OS, you might also enable cute programming scenarios where an image is superimposed over every print job (practical joke) or every document that hits the printer's hard disk is mirrored and e-faxed to some nefarious location (major, big-time, you're-fired security hole).
And think about physical security, too. Printers often sit in public areas that can double as waiting areas. Some yahoo unplugs a printer and plugs in his laptop, and all of a sudden, he has DHCP-ified access to the network while you're in a meeting room discussing the new sugar spout design.
Printer manufacturers aren't unaware of this stuff. The better players, including both Kyocera and HP, issue regular patches for the operating systems on their machines. These need to be made part of the automatic patching process on the network. These same companies often have software management suites of their own with built-in security functionality — Kyocera just demoed its version to me a little while back. You also need to find a systems management solution and an end-point security solution that have features specific to printers. And if you buy a lot of these things from a manufacturer or a VAR, you might discuss a custom configuration so that you don't need to spend so many man-hours reconfiguring them yourself.
Sure, it's one more headache in an Advil-heavy world, but it's better than having an HR rep call for support on her hacked printer so that she can print your pink slip.