Analysis

The human factor of endpoint security

Security systems are only effective if your workforce choose to use them.

In this video, the Head of HP's Security Lab Simon Shiu and HP Technical Sales Manager Neil Anderson explain how human beings are often the weakest link in system security, and what can be done to guard against this. Whilst some of this is about how systems are designed, education is also fundamentally important. This is where HP's video series The Wolf comes in. Starring Christian Slater, these videos dramatise how human beings and the way they use technology can be the conduit through which hackers gain access to a company's systems.

Advertisement - Article continues below

In particular, the way printers are used within a company can turn them into an endpoint through which hackers can gain access to further information. For example, a compromised multi-function printer can be used to capture data containing usernames and passwords, that in turn enables discovery of information regarding a stock listing. This then has financial implications for the fictional company in The Wolf video, but it's a threat that's all too real. This story provides very useful education about how company staff can avoid falling prey to phishing attacks that give hackers access to endpoints such as printers. But HP is also honing the user experience of its products to make all this more intuitive, so keeping things secure is even easier to achieve.

Advertisement
Advertisement - Article continues below

Find out how to make security easier for your workers.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/mobile/mobile-security/355889/parachute-introduces-superlock-feature
mobile security

Parachute's Superlock feature keeps your phone recording in an emergency

2 Jun 2020
Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/hardware/355788/hp-unveils-a-host-of-work-from-home-hardware
Hardware

HP unveils a host of work-from-home hardware

26 May 2020
Visit/hardware/laptops/354872/hp-elite-dragonfly-g1-review-an-enterprise-essential
Laptops

HP Elite Dragonfly G1 review: An enterprise essential

29 Apr 2020

Most Popular

Visit/operating-systems/ios/355935/apple-confirms-serious-bugs-in-ios-135
iOS

Apple confirms serious bugs in iOS 13.5

4 Jun 2020
Visit/mobile/5g/355911/the-uk-pivots-to-japan-for-5g-equipment
5G

The UK looks to Japan and South Korea for 5G equipment

4 Jun 2020
Visit/security/ransomware/355945/new-ransomware-uses-java-to-target-software-organisations
ransomware

Tycoon ransomware discovered using Java image files to target software firms

5 Jun 2020