TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      The great crypto crash: the fallout, and what happens next

      22 June 2022

      Winter 1, Eskom 0

      22 June 2022

      What it will take to bring the Guptas to justice

      22 June 2022

      Inflation in South Africa spikes higher

      22 June 2022

      Eskom announces massive escalation in load shedding

      22 June 2022
    • World

      Tether to launch a stablecoin tied to the British pound

      22 June 2022

      Tech giants form metaverse standards body, without Apple

      22 June 2022

      There are still unresolved matters in Twitter deal, Musk says

      21 June 2022

      5G subscriptions to top one billion in 2022: Ericsson

      21 June 2022

      Crypto lenders face a DeFi drubbing

      21 June 2022
    • In-depth

      Goodbye, Internet Explorer – you really won’t be missed

      19 June 2022

      Oracle’s database dominance threatened by rise of cloud-first rivals

      13 June 2022

      Everything Apple announced at WWDC – in less than 500 words

      7 June 2022

      Sheryl Sandberg’s ad empire leaves a complicated legacy

      2 June 2022

      Tulipmania meets the real economy at WhatsApp speed

      30 May 2022
    • Podcasts

      How your organisation can triage its information security risk

      22 June 2022

      Everything PC S01E06 – ‘Apple Silicon’

      15 June 2022

      The youth might just save us

      15 June 2022

      Everything PC S01E05 – ‘Nvidia: The Green Goblin’

      8 June 2022

      Everything PC S01E04 – ‘The story of Intel – part 2’

      1 June 2022
    • Opinion

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022

      How AI is being deployed in the fight against cybercriminals

      8 April 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»Sections»Information security»Secure workstations in a post-Covid world are critical

    Secure workstations in a post-Covid world are critical

    Information security By Datacentrix and HP4 March 2022
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Today, the bulk of the cybersecurity team’s focus and resources are given to the company’s servers and network devices, which makes sense because a breach or other security event in one of these can have the most catastrophic consequences.

    However, workstations should never be ignored, as they can be used by cunning and sophisticated cyber adversaries to breach the network and, alongside that, get their hands on the company’s most private and proprietary information.

    However, most attention given to the security of workstations has centred on a range of malware, including viruses, worms, trojans, adware, spam and spyware, since these types of malware can negatively impact on productivity. Sadly, too few businesses really consider the other threats that their workstations face, and the fallout in the event of a successful security attack.

    Workstation security took a massive knock, as machines now reside outside the company

    Cybercrooks have their eyes on many profitable targets like large database servers, but companies often forget that workstations also contain valuable data, including passwords, which are effectively the keys to the kingdom.

    Even employees who don’t necessarily have access to the company’s crown jewels of data can still have their machines hijacked by bad actors to commit other acts of malfeasance, such as crypto jacking and eavesdropping, and even using the device as part of a botnet to carry out DDoS attacks.

    Other employees, such as those in the finance department or staff employed in human resources and payroll, are a prize in themselves, and have a wealth of lucrative data on their machines that most attackers are dying to get their hands on.

    To learn more about HP Z Workstations, visit Datacentrix

    This is because these systems often contain a vast amount of highly valuable data, which, if in the wrong hands, could lead to a public disclosure with not only financial consequences but embarrassing reputational ones too. It’s important to remember that even staff in different areas of the business could potentially have all manner of information stored on their workstations, including financial information, strategic and planning data, confidential communications, and payroll and tax data.

    Difficult to audit and control

    Compounding the problem is the fact that whoever has access to this information is extremely difficult to audit and control compared to information in a central database server. And while encouraging staff to store only the bare minimum that is strictly necessary to do their jobs is a good idea, this isn’t always practical, and can hamper them from doing their jobs properly. Moreover, even if employee workstations don’t contain any really sensitive information, if they are breached, attackers can still access that centralised server and, with it, the data they are after.

    When it comes to employees in the IT department, such as network or system administrators, companies need to be even more vigilant. Not only do IT staff often have extremely valuable data on their machines, but they also have admin access, which in the wrong hands would effectively give threat actors access to anything they want within the company’s environment. At the same time, their job functions introduce another level of risk, as they are tasked with testing new third-party software, as well as a slew of applications and other tools. All these apps, tools and software can come hand in hand with major dangers and can give attackers a foothold in the organisation if they are compromised in any way.

    All these risks are compounded by the fact that we are living in a different world, thanks to the Covid-19 pandemic that saw entire workforces moving to remote working overnight, and following this, a shift to a hybrid mixture of working from the office and home.

    From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine

    Workstation security took a massive knock, as machines now reside outside the company. Therefore, traditional network-based security on its own is inadequate for today’s security needs. In these challenging times, endpoint devices must become the first line of defence, and hardware-based workstation security is more critical than ever before.

    This is why it is key to remember that when it comes to choosing workstations for employees, not all workstations are created equal when it comes to cybersecurity.

    Organisations need to remember that cybercriminals are more motivated, sophisticated and well-funded than ever befo, and they have your organisation in their cross hairs. This is why certain HP Z Workstations feature HP Wolf Security, which is always-on and always keeping an eye out, to ensure businesses and their teams stay safe and secure.

    Therefore, while the digital landscape keeps evolving, and alongside this, security risks and threats, too, the security solutions engineered into HP workstations are designed to protect organisations from all manner of threats. From the moment your HP Z Workstation is switched on, security tools work together in the background to protect your machine and, with it, your most critical data.

    To learn more about HP Z Workstations, visit Datacentrix.

    • This promoted content was paid for by the party concerned
    Datacentrix HP HP Z HP Z Workstations
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleBreaking the rules: Samsung’s Galaxy S22 series is a game changer
    Next Article Reinventing learning: a major focus for HP in Africa

    Related Posts

    The great crypto crash: the fallout, and what happens next

    22 June 2022

    Winter 1, Eskom 0

    22 June 2022

    What it will take to bring the Guptas to justice

    22 June 2022
    Add A Comment

    Comments are closed.

    Promoted

    More than card machines – iKhokha diversifies to reach more SMEs

    22 June 2022

    What does it cost to be a student in 2022?

    22 June 2022

    Rugged PCs bring AI to the edge in industrial settings

    21 June 2022
    Opinion

    Has South Africa’s advertising industry lost its way?

    21 June 2022

    Rob Lith: What Icasa’s spectrum auction means for SA companies

    13 June 2022

    A proposed solution to crypto’s stablecoin problem

    19 May 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.