Analysis

The human factor of endpoint security

Security systems are only effective if your workforce choose to use them.

In this video, the Head of HP's Security Lab Simon Shiu and HP Technical Sales Manager Neil Anderson explain how human beings are often the weakest link in system security, and what can be done to guard against this. Whilst some of this is about how systems are designed, education is also fundamentally important. This is where HP's video series The Wolf comes in. Starring Christian Slater, these videos dramatise how human beings and the way they use technology can be the conduit through which hackers gain access to a company's systems.

In particular, the way printers are used within a company can turn them into an endpoint through which hackers can gain access to further information. For example, a compromised multi-function printer can be used to capture data containing usernames and passwords, that in turn enables discovery of information regarding a stock listing. This then has financial implications for the fictional company in The Wolf video, but it's a threat that's all too real. This story provides very useful education about how company staff can avoid falling prey to phishing attacks that give hackers access to endpoints such as printers. But HP is also honing the user experience of its products to make all this more intuitive, so keeping things secure is even easier to achieve.

Find out how to make security easier for your workers.

Featured Resources

Report: The State of Software Security

This annual report explores important trends in software security

Download now

A fast guide to finding your cloud solution

One size doesn't fit all in the cloud, so how do you find the best option for your business?

Download now

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Small & Medium Business Trends Report

Insights from 2,000+ business owners and leaders worldwide

Download now

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/hardware/354336/the-it-pro-products-of-the-year-2019-all-the-years-best-hardware
Hardware

The IT Pro Products of the Year 2019: All the year’s best hardware

24 Dec 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/in-depth/354726/sonos-speakers-are-environmentally-unsound
In-depth

Sonos speakers are environmentally unsound

9 Feb 2020