Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      GSMA coalition targets $40 smartphone to connect millions across Africa

      GSMA coalition targets $40 smartphone to connect millions across Africa

      3 March 2026
      Discovery goes all-in on AI - Adrian Gore

      Discovery goes all-in on AI

      3 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      iOCO is mulling acquisitions as its turnaround bears fruit

      iOCO expects up to 58% jump in interim earnings

      3 March 2026
      Bold reforms needed to fix Stem education in South Africa

      Bold reforms needed to fix Stem education in South Africa

      3 March 2026
    • World
      OpenAI secures $840-billion valuation in latest funding round

      OpenAI secures $840-billion valuation in latest funding round

      1 March 2026

      Stripe mulling bid for PayPal: report

      25 February 2026
      Xbox chief Phil Spencer retires from Microsoft

      Xbox chief Phil Spencer retires from Microsoft

      22 February 2026
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Secure workstations in a post-Covid world are critical

    Secure workstations in a post-Covid world are critical

    By Datacentrix and HP4 March 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Today, the bulk of the cybersecurity team’s focus and resources are given to the company’s servers and network devices, which makes sense because a breach or other security event in one of these can have the most catastrophic consequences.

    However, workstations should never be ignored, as they can be used by cunning and sophisticated cyber adversaries to breach the network and, alongside that, get their hands on the company’s most private and proprietary information.

    However, most attention given to the security of workstations has centred on a range of malware, including viruses, worms, trojans, adware, spam and spyware, since these types of malware can negatively impact on productivity. Sadly, too few businesses really consider the other threats that their workstations face, and the fallout in the event of a successful security attack.

    Workstation security took a massive knock, as machines now reside outside the company

    Cybercrooks have their eyes on many profitable targets like large database servers, but companies often forget that workstations also contain valuable data, including passwords, which are effectively the keys to the kingdom.

    Even employees who don’t necessarily have access to the company’s crown jewels of data can still have their machines hijacked by bad actors to commit other acts of malfeasance, such as crypto jacking and eavesdropping, and even using the device as part of a botnet to carry out DDoS attacks.

    Other employees, such as those in the finance department or staff employed in human resources and payroll, are a prize in themselves, and have a wealth of lucrative data on their machines that most attackers are dying to get their hands on.

    To learn more about HP Z Workstations, visit Datacentrix

    This is because these systems often contain a vast amount of highly valuable data, which, if in the wrong hands, could lead to a public disclosure with not only financial consequences but embarrassing reputational ones too. It’s important to remember that even staff in different areas of the business could potentially have all manner of information stored on their workstations, including financial information, strategic and planning data, confidential communications, and payroll and tax data.

    Difficult to audit and control

    Compounding the problem is the fact that whoever has access to this information is extremely difficult to audit and control compared to information in a central database server. And while encouraging staff to store only the bare minimum that is strictly necessary to do their jobs is a good idea, this isn’t always practical, and can hamper them from doing their jobs properly. Moreover, even if employee workstations don’t contain any really sensitive information, if they are breached, attackers can still access that centralised server and, with it, the data they are after.

    When it comes to employees in the IT department, such as network or system administrators, companies need to be even more vigilant. Not only do IT staff often have extremely valuable data on their machines, but they also have admin access, which in the wrong hands would effectively give threat actors access to anything they want within the company’s environment. At the same time, their job functions introduce another level of risk, as they are tasked with testing new third-party software, as well as a slew of applications and other tools. All these apps, tools and software can come hand in hand with major dangers and can give attackers a foothold in the organisation if they are compromised in any way.

    All these risks are compounded by the fact that we are living in a different world, thanks to the Covid-19 pandemic that saw entire workforces moving to remote working overnight, and following this, a shift to a hybrid mixture of working from the office and home.

    From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine

    Workstation security took a massive knock, as machines now reside outside the company. Therefore, traditional network-based security on its own is inadequate for today’s security needs. In these challenging times, endpoint devices must become the first line of defence, and hardware-based workstation security is more critical than ever before.

    This is why it is key to remember that when it comes to choosing workstations for employees, not all workstations are created equal when it comes to cybersecurity.

    Organisations need to remember that cybercriminals are more motivated, sophisticated and well-funded than ever befo, and they have your organisation in their cross hairs. This is why certain HP Z Workstations feature HP Wolf Security, which is always-on and always keeping an eye out, to ensure businesses and their teams stay safe and secure.

    Therefore, while the digital landscape keeps evolving, and alongside this, security risks and threats, too, the security solutions engineered into HP workstations are designed to protect organisations from all manner of threats. From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine and, with it, your most critical data.

    To learn more about HP Z Workstations, visit Datacentrix.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Datacentrix HP HP Z HP Z Workstations
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBreaking the rules: Samsung’s Galaxy S22 series is a game changer
    Next Article Reinventing learning: a major focus for HP in Africa

    Related Posts

    RAM prices are surging, threatening to drive up the cost of PCs, smartphones and other consumer electronics devices

    AI is eating the world’s memory – and we’re all going to pay the price

    22 January 2026
    TCS + | HP's AI future - how on-device intelligence is redefining work in Africa Ertug Ayik

    TCS + | HP’s AI future – how on-device intelligence is redefining work in Africa

    4 September 2025
    Global firms eyeing South African IT companies for M&A deals

    Global firms eyeing South African IT companies for M&A deals

    22 January 2025
    Add A Comment

    Comments are closed.

    Company News
    Paratus Zambia adds next generation fixed wireless technology

    Paratus Zambia adds next-generation fixed-wireless technology

    3 March 2026
    Policy at the edge: PCF’s AAA+ vouchers deliver predictable data spend

    Policy at the edge: PCF’s AAA+ vouchers deliver predictable data spend

    3 March 2026
    AI-ready schools already exist - just not in physical classrooms - CambriLearn

    AI-ready schools already exist – just not in physical classrooms

    2 March 2026
    Opinion
    The AI fraud crisis your bank is not ready for - Andries Maritz

    The AI fraud crisis your bank is not ready for

    18 February 2026
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    GSMA coalition targets $40 smartphone to connect millions across Africa

    GSMA coalition targets $40 smartphone to connect millions across Africa

    3 March 2026
    Discovery goes all-in on AI - Adrian Gore

    Discovery goes all-in on AI

    3 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026
    iOCO is mulling acquisitions as its turnaround bears fruit

    iOCO expects up to 58% jump in interim earnings

    3 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}