Best front line defenses against back end security threats
Until recently, employees were beholden to an office but at least somewhat protected by its network. Now, the overwhelming majority are location independent, at least part of the time. They carry out their day-to-day across different time zones and devices, 60% of which are improperly monitored for security.
In and out of office, protecting this tech is paramount. And organisations are working harder than ever to prevent the financial disruptions and reputation losses that come at the hands of a breach.
Here’s how you can join them.
Protect your endpoints
Your security is only as strong as your weakest link. In this case, that’s probably your endpoints. And cyberattackers know it.
In 2018, Ponemon surveyed 660 IT and IT security professionals from global companies, and almost two thirds reported a major breach that started at an endpoint, up 17% on the previous year.
To secure vulnerable endpoints, ensure:
- Employees can spot email threats – Over half of breaches in small and medium companies are caused by human error. The most common entry point to your endpoints? Email. One in ten are classified as malicious.
- Your protection goes beyond antivirus alone – Over half of endpoint attacks are missed by antivirus, and zero-day attacks, launched by clicking links or downloading files from emails or browsers, are four times more likely to compromise organisations than a known attack.
- Breaches are discovered in real-time – Cyberattacks can compromise your system in minutes. Yet, two thirds of breaches aren’t discovered until months after the fact.
- You have proper IT support – 59% of cybersecurity professionals say the widening workforce/knowledge gap puts their organisations at risk. Encourage your team to continually learn new skills that can help fully manage and monitor devices in your network.
Stay safe from visual hackers
Ever get the feeling someone’s watching you work? They might be.
More than two thirds of business travelers report being concerned about visual hacking, an act performed by ‘shoulder surfers’ who spy on a person’s computer screen or desk to obtain classified information for unauthorised use.
But you don’t have to be on the road to potentially expose sensitive company data. All it takes is a single look at your screen to instantly and irreversibly compromise your company. It could happen to anyone, anywhere – and increasingly does.
Managers who want to protect their workforce can start by educating their staff about visual hacking. 30% of survey respondents say they’ve never learned about how to defend their screens, or its sensitive information.
From there, the best protection from this low-tech threat is high-tech devices with built-in security features, such as HP Sure View. The HP EliteBook 800 Series, with optional 8th Generation Intel® CoreTM Processors, is frequently cited among the world’s most secure and manageable PCs.
When coupled with HP Sure View Gen 36 – a built-in PC privacy screen – prying eyes get left in the dark, literally. With a single button, users can block 95% of visible light from would-be side seers, making on-screen info only available to the user.
Understand hardware purchases are a security decision
If your software and network security are strong, your endpoints are fully protected, right? Wrong. Every device on or within your network is a security decision in and of itself. That includes PCs, printers and any other IoT device.
From the moment a piece of IT equipment or hardware is procured until it’s no longer in use, state-of-the-art security requirements should be a non-negotiable – no exception.
Keeping tech protected has never been more critical for companies. Whether at home, in a centralised office, or otherwise outside its confines, PC and print security is on this rise – and these innovations are only the beginning.