Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Post Office still faces liquidation risk as policy rift widens - Mondli Gungubele

      Post Office still faces liquidation risk as policy rift widens

      9 February 2026
      SABC says it can't afford to cover the next election

      SABC says it can’t afford to cover the next election

      9 February 2026
      Home affairs' R10 ID fee is forcing companies to rethink identity verification

      Home affairs’ R10 ID fee is forcing companies to rethink identity verification

      9 February 2026
      Tech salaries in South Africa are bouncing back

      Tech salaries in South Africa are bouncing back

      9 February 2026
      Vumatel tops a million subscribers in South African broadband milestone - Dietlof Mare

      Vumatel tops a million subscribers in South African broadband milestone

      9 February 2026
    • World
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
      Crypto firm accidentally sends R700-billion in bitcoin to its users

      Crypto firm accidentally sends R700-billion in bitcoin to its users

      8 February 2026
      AI won't replace software, says Nvidia CEO amid market rout - Jensen Huang

      AI won’t replace software, says Nvidia CEO amid market rout

      4 February 2026
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Secure workstations in a post-Covid world are critical

    Secure workstations in a post-Covid world are critical

    By Datacentrix and HP4 March 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Today, the bulk of the cybersecurity team’s focus and resources are given to the company’s servers and network devices, which makes sense because a breach or other security event in one of these can have the most catastrophic consequences.

    However, workstations should never be ignored, as they can be used by cunning and sophisticated cyber adversaries to breach the network and, alongside that, get their hands on the company’s most private and proprietary information.

    However, most attention given to the security of workstations has centred on a range of malware, including viruses, worms, trojans, adware, spam and spyware, since these types of malware can negatively impact on productivity. Sadly, too few businesses really consider the other threats that their workstations face, and the fallout in the event of a successful security attack.

    Workstation security took a massive knock, as machines now reside outside the company

    Cybercrooks have their eyes on many profitable targets like large database servers, but companies often forget that workstations also contain valuable data, including passwords, which are effectively the keys to the kingdom.

    Even employees who don’t necessarily have access to the company’s crown jewels of data can still have their machines hijacked by bad actors to commit other acts of malfeasance, such as crypto jacking and eavesdropping, and even using the device as part of a botnet to carry out DDoS attacks.

    Other employees, such as those in the finance department or staff employed in human resources and payroll, are a prize in themselves, and have a wealth of lucrative data on their machines that most attackers are dying to get their hands on.

    To learn more about HP Z Workstations, visit Datacentrix

    This is because these systems often contain a vast amount of highly valuable data, which, if in the wrong hands, could lead to a public disclosure with not only financial consequences but embarrassing reputational ones too. It’s important to remember that even staff in different areas of the business could potentially have all manner of information stored on their workstations, including financial information, strategic and planning data, confidential communications, and payroll and tax data.

    Difficult to audit and control

    Compounding the problem is the fact that whoever has access to this information is extremely difficult to audit and control compared to information in a central database server. And while encouraging staff to store only the bare minimum that is strictly necessary to do their jobs is a good idea, this isn’t always practical, and can hamper them from doing their jobs properly. Moreover, even if employee workstations don’t contain any really sensitive information, if they are breached, attackers can still access that centralised server and, with it, the data they are after.

    When it comes to employees in the IT department, such as network or system administrators, companies need to be even more vigilant. Not only do IT staff often have extremely valuable data on their machines, but they also have admin access, which in the wrong hands would effectively give threat actors access to anything they want within the company’s environment. At the same time, their job functions introduce another level of risk, as they are tasked with testing new third-party software, as well as a slew of applications and other tools. All these apps, tools and software can come hand in hand with major dangers and can give attackers a foothold in the organisation if they are compromised in any way.

    All these risks are compounded by the fact that we are living in a different world, thanks to the Covid-19 pandemic that saw entire workforces moving to remote working overnight, and following this, a shift to a hybrid mixture of working from the office and home.

    From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine

    Workstation security took a massive knock, as machines now reside outside the company. Therefore, traditional network-based security on its own is inadequate for today’s security needs. In these challenging times, endpoint devices must become the first line of defence, and hardware-based workstation security is more critical than ever before.

    This is why it is key to remember that when it comes to choosing workstations for employees, not all workstations are created equal when it comes to cybersecurity.

    Organisations need to remember that cybercriminals are more motivated, sophisticated and well-funded than ever befo, and they have your organisation in their cross hairs. This is why certain HP Z Workstations feature HP Wolf Security, which is always-on and always keeping an eye out, to ensure businesses and their teams stay safe and secure.

    Therefore, while the digital landscape keeps evolving, and alongside this, security risks and threats, too, the security solutions engineered into HP workstations are designed to protect organisations from all manner of threats. From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine and, with it, your most critical data.

    To learn more about HP Z Workstations, visit Datacentrix.

    • This promoted content was paid for by the party concerned


    Datacentrix HP HP Z HP Z Workstations
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBreaking the rules: Samsung’s Galaxy S22 series is a game changer
    Next Article Reinventing learning: a major focus for HP in Africa

    Related Posts

    AI is eating the world's memory - and we're all going to pay the price

    AI is eating the world’s memory – and we’re all going to pay the price

    22 January 2026
    TCS + | HP's AI future - how on-device intelligence is redefining work in Africa Ertug Ayik

    TCS + | HP’s AI future – how on-device intelligence is redefining work in Africa

    4 September 2025
    Global firms eyeing South African IT companies for M&A deals

    Global firms eyeing South African IT companies for M&A deals

    22 January 2025
    Add A Comment

    Comments are closed.

    Company News
    Xiaomi Redmi Note 15 Series launches with podcast recorded at Tugela Falls

    Xiaomi Redmi Note 15 Series launches with podcast recorded at Tugela Falls

    9 February 2026
    Paratus lights up new East Africa fibre highway linking Goma and Mombasa

    Paratus lights up new East Africa fibre highway linking Goma and Mombasa

    9 February 2026
    The new way of working - an Mweb study

    The new way of working – an Mweb study

    9 February 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Post Office still faces liquidation risk as policy rift widens - Mondli Gungubele

    Post Office still faces liquidation risk as policy rift widens

    9 February 2026
    SABC says it can't afford to cover the next election

    SABC says it can’t afford to cover the next election

    9 February 2026
    Home affairs' R10 ID fee is forcing companies to rethink identity verification

    Home affairs’ R10 ID fee is forcing companies to rethink identity verification

    9 February 2026
    EU regulators take aim at WhatsApp

    EU regulators take aim at WhatsApp

    9 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}