Content Block
Ask HP a question
HP
Jul 20, 2018 at 21:42 UTC on the HP page
HP
Partners replied to TPM upgrade from 1.2 to 2.0 and 6 more topics
Jul 18, 2018 at 19:37 UTC on the HP page
Erin for HP EMEA
Jul 17, 2018 at 14:53 UTC in General IT Security
Mini magick20170706 32712 1tm7ei9 big
Erin for HP EMEA
Jul 17, 2018 at 13:32 UTC | HP

Preventing hackers with tips from Shivaun Albright


Once upon a time, not so long ago, companies employed antivirus software and firewalls, and they considered themselves protected from cybercriminals. It was a simple time, full of blissful ignorance.

And then, all hell broke loose.

2017 was one of the worst years on record for cybersecurity. Businesses experienced some of the biggest, most destructive, and most sophisticated attacks in the history of the digital age. But while each data breach cost US enterprises an average of $1.3 million, they taught an expensive lesson IT pros everywhere need to learn: The usual measures relied on for preventing hackers aren’t enough.

How can you stay a step ahead of criminals and protect your organization against cybercrime? Before you can answer that with confidence, you need to know your enemy. During a recent ISSA International webinar, “2017 Year in Review and Predictions for 2018,” Shivaun Albright, HP’s Chief Technologist for Printing Security Solutions, shared how to do just that. By using Stuart Coulson’s Seven Levels of Hacking, she explained who these bad actors are and what to look out for.

“If you really understood the motives of hackers,” Shivaun said, “Then you and your clients would be more proactive in protecting themselves.”

To read the full list of tips from Shivaun, click here!

Mini magick20151030 7085 6ome39 big
Priscilla@HP
Jul 16, 2018 at 19:10 UTC | HP

Join us for On the Air & Enter to Win One of TWO Omen 32” LED-lit Monitors!

Hi SpiceHeads!

As you know well, it’s no longer a matter of “if” but “when” a cyberattack will occur. Throughout the first half of 2018, security breaches have continued to expand in both volume and sophistication. Your PC’s hardware may be the answer you need against the threats of tomorrow.

Join us next week on Wednesday, 7/25/18, for a very Special On the Air show, brought to you by HP!  Learn how Every PC Decision is a Security Decision with your favorite host, Justin Ong, and our special guest, Senior Security Specialist, Rick Griencewic.

Sign up TODAY and be entered to win one of TWO Omen 32” LED-lit monitors!




  • View 4 other comments
  • Mini magick20151030 7085 6ome39 big
    Priscilla@HP Jul 17, 2018 at 13:55 UTC

    Daniel Hinderaker wrote:

    The prize is just for US and Canadian residents?

    Hello @Daniel Hinderaker, appreciating very much your question.  Most likely the prize is just for U.S. [and Canadian] residents.  However, let me confirm.  Keep in mind that you will still be able to join the discussion from your location.

    P.S. Edited to include Canadian members for prizes.

    Edited Jul 17, 2018 at 19:56 UTC
  • Mini magick20151030 7085 6ome39 big
    Priscilla@HP Jul 18, 2018 at 17:46 UTC
    Here's an update.  I've received confirmation from staff on the HP Spiceworks, "...CA and US only".   Let us know if you have other questions.  We welcome your other comments. 
Priscilla@HP
Jul 13, 2018 at 20:43 UTC in Windows 10
Priscilla@HP
Jul 13, 2018 at 20:27 UTC in Windows 10
HP
Partners replied to hpconnected printqueue and 8 more topics
Jul 13, 2018 at 17:30 UTC on the HP page
Mini magick20170706 32712 1tm7ei9 big
Erin for HP EMEA
Jul 12, 2018 at 16:13 UTC | HP

4 steps to build a strong security foundation

If you’re a small or midsize business IT manager, you may spend a lot of sleepless nights worrying about the evolving challenges of cybersecurity and IT asset management. As you toss and turn, you might contemplate the potential damage today’s more sophisticated security breaches could wreak on your business. You wonder if—even with detection and prevention mechanisms in place—there are cracks in your security foundation that could contribute to financial losses, compromised customer information, or even business collapse.

Even though you don’t have the capital and resources of a larger business, you know the likelihood of your business being victimized by a hack is still alarmingly high. On top of that, you can’t afford to ignore new threats. Fortunately, you can take proactive measures to ensure your security foundation is shored up and ready to fend off potential threats.

1. Go back to the security basics

When strengthening your security foundation, don’t overlook the well-known, nonnegotiable security basics. Today’s cybercriminals are more sophisticated than ever, so don’t be lulled into thinking any part of your IT environment can be left unsecured. Firewalls must be flexible and designed to secure both wireless and wire-based access points, while anti-malware tools should be installed on every single endpoint and server—even the ones you don’t think are likely to be attacked.

Case in point, let’s take a look at your printers. Printers are endpoints all organizations use, and they’re usually tightly integrated into critical IT systems. On the surface, they may not seem likely targets for cybersaboteurs, but if left unsecured, hackers can leverage these entry points as gateways to infiltrate your network and initiate a whole slew of damages. For that reason, you may want to consider investing in smart printers that can detect malicious code and prevent it from spreading to the rest of your network.

2. Prepare for the worst

If you’re not doing so already, encrypting data at rest or in transit just makes good defense sense. In today’s threat environment, it’s not enough to simply block hackers from attempting to gain entry. You’ll also need to make it difficult for attackers to steal your data—even if they manage to breach your network. Encryption is a relatively easy step you can take to protect your intellectual property and business data, and it’s a necessary practice for adhering to most compliance regulations, too.

In the event a data breach occurs, you’ll want a backup plan in your pocket. Even SMBs that don’t necessarily have the personnel to rapidly end a security breach can still create policies to limit damage and implement a business continuity plan. Planning ahead to minimize downtime could save your company thousands of dollars in lost revenue and customer confidence.

3. Shoot phish in a barrel

The companies that can best weather—or avoid—a serious security incident are those involving all staff in the protection of the IT environment. Spam filters can capture some phishing emails and other junk, but employee security training is key to laying a strong security foundation.

In a rather sad development, humans—not machines—have become the unwitting tools of the cyber underworld. A report from PhishMe found that 91 percent (yes, you read that correctly) of cyber attacks began with a phishing email. Why do otherwise good employees click on bad emails? Curiosity, fear, or a sense of urgency in an email header can motivate some to take that action, but lack of education lies at the heart of all these incidents.

When an employee clicks on a malware-infected attachment, they may also be tricked into providing login and password credentials. Then, bam—the welcome mat is out, the lights are on, and the smoking lamp is lit. That’s why it’s important for all employees to know exactly what a phishing email looks like and what to do if they suspect they might have received one.

In addition to cybersecurity training, it may also make sense for you to create and widely distribute your company’s data security policy. Your employees need to know there’s an agreed-upon norm for how company data or credentials can be shared, what information is restricted, and what is acceptable social media activity in relation to your company. As tough as it may seem, you should create consequences for not adhering to the policy.

4. Stack your data on a strong, secure backbone

Ultimately, cybersecurity comes down to protecting the data backbone of your business with security fundamentals. You have a lot to think about in terms of potential threats, but by taking care of these security basics, you can block the majority of your threats. Once you’ve strengthened your security foundation, IT asset management within your environment will become safer and more dependable—and a better night’s sleep will be in your future.

To read the original article, click here!

HP
Jul 12, 2018 at 15:40 UTC on the HP page
Priscilla@HP
provided the best answer for Print Quality on HP Color Printer
Jul 6, 2018 at 15:58 UTC in Printers, Copiers, Scanners & Faxes

Join now for updates. Creating your account only takes a few minutes.

Join Now

HP in Spiceworks

Edit
  • Mini magick20151030 7085 6ome39 big
    Other
    Jul 20, 2018 at 21:42 UTC
    • Mini magick20160119 36532 1s606b6 big
    • Mini magick20170706 32712 1tm7ei9 big
    • Mini magick20170629 12511 5zq3sw big
    About HP