20 March 2017
3 min read
Breaches are nearly inevitable. IT professionals know that. Still. Just because they're inevitable doesn’t make them any less costly. The average breach costs $907,053 to recover from. All in, Ponemon found the mean annualised cost of a breach to be $9.5million, up from $7.7 million the year before.
These steps may not prevent every breach, but they'll certainly go a long way. And at the very least, they'll help to demonstrate due diligence should the worst occur.
For best practice, combine best practice like the steps below with devices that are built from the ground up with security in mind. At HP, safety comes first and all PCs and devices are designed with security built in. For example the HP EliteBook x360 was recently announced as the world’s thinnest and most secure business convertible.1 Equipped with the latest 7th Gen Intel® Core™ processors it also packs a punch. Intel Inside®. Powerful Productivity Outside.
Check out the steps below:
1. Account for every device
Audit every device with access to your network and discover whether they’re , authorised and unauthorised. With the rise in BYOD this has never been more important.Consumer devices are often preferred especially by Millennials because they believe business devices are harder to use and have less functionality however they bring with them security risks. – in a time of increased BYOD, this has never been more important
2. Implement enterprise-grade security software
Cover your network, email and endpoints with regularly updated antivirus, antimalware and real-time detect and respond capability
3. Keep on top of updates
Keep every device on the same baseline, with regular updates, so nothing is weaker than anything it's connected to
4. Encrypt data stored in the cloud
Restrict data on a need to know basis with an encryption tool like PKWARE’s Smartcrypt
5. Continuously monitor traffic
Traffic analysis can be the key to revealing intruders. A spike in activity could be a Trojan communicating with its mothership
6. Enable remote wipe on employee devices
Erasing data in the event of loss or theft can minimise damage. Remote wipe is free for Android, Blackberry and iOS
7. Implement multi-factor authentication
The more layers of protection, the harder it is for a hacker. Ideally, have biometric log-in for every employee device
8. Educate staff in cyber security
Most attacks originate from employee negligence or malice. Ensure every employee is aware of cyber security and prevent basic mistakes
Consider carefully the devices you offer to your team. Consumer devices are often preferred especially by Millennials because they believe business devices are harder to use and have less functionality. The rise in BYOD is a direct result of users wanting to bring consumer devices into the workplace but the result can lead to challenges for IT in terms of servicing and maintenance and security.
The HP EliteBook x360 brings together the best of both consumer and business technology. A high spec hybrid laptop and equipped with the latest 7th Gen Intel® Core™ processors including the Intel® Core™ i7 processor and up to 16GB RAM. It is the world’s thinnest and most secure business convertible1 and comes with 360° of versatility across five modes, unmatched security, and up to 16 hours and 30 minutes of battery life2. It is perfectly suited to work, play and anything in between.
Find out more here.
Intel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries.
1. Most secure based on HP’s unique and comprehensive security capabilities at no additional cost among vendors with >1M annual sales as of December 1, 2016 on HP Elite PCs with Intel 7th Gen Intel® Core™ processors, Intel® integrated graphics, and Intel® WLAN. Thinnest Based on competitors with >1m units annually of convertible, non-detachables having a Windows Pro OS and 6th or 7th generation U series Intel® Core™ vPro™ processors.
2. Windows 10 MM14 battery life will vary depending on various factors including product model, configuration, loaded applications, features, use, wireless functionality, and power management settings. The maximum capacity of the battery will naturally decrease with time and usage. See www.bapco.com for additional details.