Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP Tech@Work
Today's trends for tomorrow's business
Can You Strengthen Your Weakest Cybersecurity Link?

Can You Strengthen Your Weakest Cybersecurity Link?

The answer may surprise you

There’s an adage in IT circles that people - both you and your employees - tend to be the weakest link in the cybersecurity chain. But that’s not entirely true.
Attacks actually come from a variety of places, with 72 percent perpetrated by outsiders, 27 percent involving internal actors, 2 percent involved partners and 2 percent featuring multiple parties, according to the Verizon 2018 Data Breach Investigations Report (DBIR).*
So, does this mean small and medium business (SMB) owners can relax? That you don’t have to worry about your employees triggering a potentially serious data breach costing your business time, money and stature with customers? Not by a long shot.
The plain fact is that, while employees may not initiate attacks, they can still be a major contributor to them if their devices are not adequately fortified or if they don’t follow proper security protocols.
With U.S. SMBs losing an estimated $75 billion each year to ransomware and 1 in 5 businesses closing their doors within months of such attacks, small businesses simply can’t afford to ignore cybersecurity.
Every SMB needs to have an active and effective security strategy. Such strategies should not be limited to purchasing a piece of software or installing a firewall. Rather, businesses need a “multi-layered” approach blending security tools and policies - because cyberattacks never come from one direction.
Here are 5 measures businesses should evaluate as part of their security strategies:

1. Train the staff

The most important countermeasure against cyberattack is a smart and committed workforce. Few employees want to be the reason for a problem, but employee negligence is the leading cause of data breaches for small businesses across America. As such, arming workers with the knowledge to help keep the business safe should be your first step toward countering potential problems.
Some businesses hang posters around the office encouraging employees to exercise basic precautions, such as regularly changing their passwords, locking down their machines while away, and not leaving confidential documents sitting on printer trays. Others establish mandatory annual training courses to indoctrinate employees (including executives) in current security policies and procedures. Implementing routine phishing email testing is another alternative to improving understanding and visibility.
Such efforts don’t have to cost anything. For example, the US Small Business Administration has a free online course that business owners and staff can take to learn more about safeguarding their networks.

2. Secure endpoint devices

For years, most cyberattacks targeted operating systems and software. As vendors became more adept at patching or eliminating security holes in code, hackers began shifting their attention to less secure endpoint devices, such as printers, smartphones and laptops. Every time a business buys a PC or printer, it should be viewed as a security decision. It’s no longer enough to buy a device and then a software package, like antivirus. You won’t be adequately protected.
Fortunately, manufacturers are starting to build security into the hardware. For instance, HP printers come with a variety of built-in security features to stop attackers from introducing malicious code. They protect data in transit and provide instant notifications of suspicious activity on a network. In addition, these advanced printers make it easier to have uniform security settings for each device and ensure they’re all updated regularly.
HP PCs are similarly equipped with stronger security and optional features like HP Sure View and HP Sure Click among others.
Before buying any connected device, read the fine print. Determine what kinds of embedded security features are included. All endpoint devices are not equally secure.

3. Protect those passwords

Passwords are easily the worst security measure ever invented. They are too easy to spoof. And most of us choose ridiculously weak passwords involving the names of someone we know and a few numbers.
The trouble with this is that hackers have access to software with built-in directories of the most common names, which lets them crack these passwords in mere minutes. What’s more, many of us don’t want to be bothered with passwords, so we thoughtlessly plug in something like “123456,” a password so easy to guess that it accounted for 17 percent of 10 million compromised passwords in 2016, according to Keeper Security.
All of this said, it’s unlikely we’ll get rid of passwords anytime soon. We’re too accustomed to them, and most organizations haven’t found that killer apps to replace them. Indeed, password use is expected to increase threefold to around 300 billion instances by 2020.
So, it behooves every organization to have an effective password policy in place. This policy should require employees to change their password at least once every three months. It should also mandate the use of strong, lengthy passwords combining a series of characters, symbols, numbers and cases.
Also consider making password vaults or managers available to employees. They will make it easy to have a complex password that you do not share across web sites. Encourage employees to have unique passwords for each Web site or application they frequent.

4. Add fingerprint scanners

Passwords are all about granting people access to network resources. Since hackers don’t have much trouble cracking them, companies must reinforce what they have with other identity and access tools.
Consider fingerprint scanners, for example. They are more secure than passwords, and are widely available today in many endpoint devices, such as business laptops and smartphones. Yes, the feature might cost a bit more, but the added protection it offers is well worth the small investment.

5. Prioritize pull printing

Pull printing is a newer technology that allows organizations to make sure only authorized users have access to the print jobs that are meant for them, ensuring that no print job is accessed by any person other than the intended recipient.
Is this really a problem? Well, recent Quocirca research indicated 61 percent of large enterprises admitted suffering at least one data breach through unsecure printing. Yet, there remains a misplaced level of complacency around print security compared to other IT endpoints. Any security strategy, therefore, should address the risk of documents being intercepted during transmission or forgotten in printer trays.
With cybersecurity incidents increasing in frequency and severity - and targeting both large and small businesses equally - it’s critical to be vigilant. By implementing some or all these best practices, you can help protect your business from a potentially devastating data breach.
* Not intended to add up to 100% due to multiple parties involved in incidents.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

More about these products
Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)