How to get the most out of your cybersecurity defenses: SA

The working environment has evolved and so have the threats. Hybrid ways of working mean more endpoints, more remote connections, and more potential access by malicious actors. South Africans have lost an estimated R2.2 billion per year to cybercrime, according to an Interpol report from October 2021. In fact, the report states that between January 2020 and February 2021, the country has experienced a total of 230 million detected threats. The first quarter of 2021 saw an increase in extortion and ransomware attacks, including Crysis, Nefilim, Ryuk, Clop and Conti varieties.

The question IT security teams and individuals need to ask themselves now is what is their best defense against the inevitable? Education and software applications to detect, prevent and recover from attacks are absolutely important. However, it’s becoming very clear that protecting your primary defenses inside a hardware-based security bunker – which malware can’t touch – is the best defense.

The wise build on solid foundations

When deciding on the ideal hardware for your teams, be sure to choose a laptop or PC with stable security that can protect the root of your protections. You want to make sure that malware can’t touch this central core. This means choosing hardware with a physically isolated, cryptographically protected, self-healing, hardware-enhanced endpoint security controller as the foundation of your security architecture.

Don’t find yourself outdone

Understand that you are not dealing with a playground bully, you are dealing with highly sophisticated organized crime syndicates. Traditional virus protection is in a constant battle to keep up with the more than 350,000 new malware variants created by these threat actors every day. You have to fight the AI ​​with the AI. Choose hardware that incorporates deep learning neural networks to defeat malware that has never been seen before. Make sure this is backed by robust defenses such as a micro-VM container that can isolate any malware that might come through, before destroying it.

The power to heal

You know how people say it’s not how many times you fall that counts, it’s how you get up that counts? It’s true. It’s important to have confidence in your detection defenses, but the reality is that even the strongest and most comprehensive solutions can suffer a breach. Destructive firmware attacks can devastate a PC, fundamentally corrupting it by attacking it at the BIOS level. An OS-level attack can cost hours or days of worker downtime and IT attention before systems are restored and ready to resume operations. If an attack goes undetected, you need to ensure that your PCs can repair themselves, quickly recovering their own operating system, from anywhere, with or without a network connection.

“Are you suggesting I’m not who I say I am?”

Some of you Gen Xers might recognize this subtitle as a line from a classic John Hughes movie “Ferris Bueller’s Day Off”. In the film, Ferris Bueller, played by Matthew Broderick, jumps through some clever hoops to essentially steal Abe Froman’s identity, to secure a table at an expensive restaurant. Although he used other actors to help convince the butler that he was Abe, he did not once show any form of identification. Spear phishing attacks look a lot like this, tricking users into obtaining login credentials, and the problem is that, most of the time, PCs don’t demand a strong enough form of proof of identity from those who try to access it.

Raise your hand if you haven’t had to hit a “Forgot Password” button in the past two weeks. We have so many passwords to remember these days that most of the time people just don’t do it, or they have poor hygiene practices by using weak, shared or reused passwords in the purpose of facilitating connection for themselves. By doing so, they make it easier for anyone else to access.

Business PCs – and the networks they connect to – are too often compromised when they rely on traditional password protection. It is best to choose PCs that require multi-factor authentication such as password, fingerprint, and facial recognition. These policies should be locked down at the hardware level to ensure no shortcuts are taken when it comes to proving to your employee that they are who they say they are.

When is a coffee not just a coffee?

Managing remote devices with a dispersed workforce is a major challenge, so it’s important to have a platform that allows your IT managers to control your PC’s endpoints and administer device settings. security from anywhere.

More and more workers are working away from their home office, especially during load shedding, and they are looking for electrical connections. The problem with cafes (anywhere that isn’t really your secure office environment) is that unwanted eyes can watch your employees – and what they’re working on – from either side of the screen, compromising sensitive data and confidential. Choose hardware that can end the site line of visual hackers with built-in privacy tools such as physical shutters on cameras, one-touch privacy shields that make the screen unreadable to nearby people, and identify confirmation who can unlock this hands-free PC.

Safety for people working on the move

The threat environment is constantly changing, which means we all need to too. It is entirely possible to create a robust security environment by combining education, security applications and services, and secure hardware. The key to successful prevention is to ensure that all the necessary building blocks are there to build a stable security base.

The choices available can be overwhelming, so it’s wise to partner with a solution provider that has your best interests at heart.

The solution

The HP Elite Dragonfly G2 (358VEA), featuring an Intel® Core™ i7 processor, layers the aforementioned security features within and on top of the operating system. With multi-factor authentication, HP Sure View technology to protect sensitive information from prying eyes, and HP Sure Run to guard against malware attacks, we guarantee this is the most secure business PC available today. today.

HP understands that the way people work is forever changing. We’re constantly innovating so your business can enjoy peace of mind with PCs secured by design with hardware-enhanced endpoint security software and endpoint security services that are perfect for people working on the go.

About Donald J. Beadle

Check Also

NCSC releases supply chain cybersecurity guidance

Image source: The National Cyber ​​Security Center (NCSC) and a number of international partners …