Analysis

The human factor of endpoint security

Security systems are only effective if your workforce choose to use them.

In this video, the Head of HP's Security Lab Simon Shiu and HP Technical Sales Manager Neil Anderson explain how human beings are often the weakest link in system security, and what can be done to guard against this. Whilst some of this is about how systems are designed, education is also fundamentally important. This is where HP's video series The Wolf comes in. Starring Christian Slater, these videos dramatise how human beings and the way they use technology can be the conduit through which hackers gain access to a company's systems.

In particular, the way printers are used within a company can turn them into an endpoint through which hackers can gain access to further information. For example, a compromised multi-function printer can be used to capture data containing usernames and passwords, that in turn enables discovery of information regarding a stock listing. This then has financial implications for the fictional company in The Wolf video, but it's a threat that's all too real. This story provides very useful education about how company staff can avoid falling prey to phishing attacks that give hackers access to endpoints such as printers. But HP is also honing the user experience of its products to make all this more intuitive, so keeping things secure is even easier to achieve.

Find out how to make security easier for your workers.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/hardware/354336/the-it-pro-products-of-the-year-2019-all-the-years-best-hardware
Hardware

The IT Pro Products of the Year 2019: All the year’s best hardware

24 Dec 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020