HWZ Forums

Login Register FAQ Mark Forums Read

Why the wall wonít protect you

Reply
 
LinkBack Thread Tools
Old 11-04-2018, 08:10 PM   #1
Honorary Member
 
mrclubbie's Avatar
 
Join Date: Oct 2008
Posts: 108,935
Why the wall wonít protect you

Why the wall wonít protect you

https://www.theedgesingapore.com/nat...9t-protect-you

Data everywhere, overwhelming security threats and hackers seeking vulnerabilities are among the digital weaknesses permeating the modern workforce today. With a 200% increase in attacks targeting notebooks and desktops over the last several years, itís difficult to keep these attacks from accessing a network.

Last year, a record number of breaches was reported in Singapore. Making the headlines were the leaks of data from a bicycle-sharing operator, a ride-sharing company and a secondary school.

IT teams are making an effort to protect company data by educating employees, running vulnerability tests and implementing secure browsing software. However, these practices arenít enough to eradicate the human errors that can cause phishing attacks, data breaches and malware exposure.

In February last year, the Cyber Security Agency of Singapore released findings from its first Cybersecurity Public Awareness Survey. While seven in 10 respondents agreed that every individual has a role to play in cybersecurity, not all of them practise safe cybersecurity measures. For instance, one in three respondents do not manage their passwords securely Ė storing passwords on a computer or writing them down, or using the same passwords for work and personal accounts. Also, 41% admitted to not conducting virus scans on devices and files before accessing them.

An evolution in the way we protect data is in order, and this means moving beyond buying the best firewall on the market as an isolated security initiative. When threats come from both inside and outside an organisation, businesses need to implement security tactics that are constantly evolving to keep up with trends.

The next security evolution

While standard approaches to security quarantine data in a guarded castle, multi-layered security is the next step in security evolution for any business. Imagine scouts on horseback, a moat and booby traps providing additional protection to the data castle. In the security world, this translates to the creation of multiple hurdles to protect data against hackers.

Network security is just one of those layers. A comprehensive data protection strategy also involves thwarting an attack that starts at any PC or printer. The closing of the loop in a layered security system rests not just in what can be applied, but also what is already built into PC and printing devices from a security perspective. HPís understanding of this strategy has led it to put security at the heart of everything we do, including the development of our PC and print solutions. HP Secure is a promise or commitment to consider security throughout the product development process Ė from the very first stage of design to final delivery.

This includes HP SureStart which works with HP BIOSphere, HPís industry-leading firmware ecosystem, to automatically restore a systemís BIOS firmware to its previously safe state if attacked or corrupted. HP PCs also have the capabilities to check and maintain device security setups, which can be managed by security experts that you can trust. HP printers sport real-time threat detection, automated monitoring and software validation Ė all to stop threats the moment they start. Meanwhile, services such as Managed Print Services and Device as a Service allow companies to offload some of the burden of securing various devices on experts.

Addressing the security needs of both the business and end users

In todayís changing employee environment, where numerous entry points are spread across a decentralised workforce, itís critical to adopt a new, holistic approach to data security.

This means allowing workers to connect when and where they need to, via secure connections that authenticate users accessing the network. By implementing managed device security that is built-in as well as bolted on, business and user security will improve through innovation at all layers of the security ecosystem.
__________________
huat huat huat huat huat huat huat huat
huat huat huat huat huat huat huat huat
mrclubbie is offline   Reply With Quote
Old 14-04-2018, 04:59 PM   #2
Senior Member
 
Mila Azul's Avatar
 
Join Date: Feb 2018
Posts: 1,837
we are never safe.
Mila Azul is offline   Reply With Quote
Old 18-05-2018, 06:58 PM   #3
Arch-Supremacy Member
 
Henry Ng's Avatar
 
Join Date: Aug 2011
Posts: 10,686
we are never safe.
True that we are never 100% safe however at least we have some basic protection so we are not so dangerous. Most home users are quite safe because we are usually not their target.
Henry Ng is offline   Reply With Quote
Old 18-05-2018, 07:01 PM   #4
Arch-Supremacy Member
 
Henry Ng's Avatar
 
Join Date: Aug 2011
Posts: 10,686
May be some playful hacker may play around with us just to practise their skill.
Henry Ng is offline   Reply With Quote
Old 18-05-2018, 09:22 PM   #5
Honorary Member
 
mrclubbie's Avatar
 
Join Date: Oct 2008
Posts: 108,935
May be some playful hacker may play around with us just to practise their skill.
Yes...Looking for loopholes
__________________
huat huat huat huat huat huat huat huat
huat huat huat huat huat huat huat huat
mrclubbie is offline   Reply With Quote
Old 18-05-2018, 11:15 PM   #6
Arch-Supremacy Member
 
Henry Ng's Avatar
 
Join Date: Aug 2011
Posts: 10,686
Yes...Looking for loopholes
Yes sometime if unlucky happen to have some playful hacker. Usually they will target bank and company that they can earn $$$. Some can even use ransomware and ask company to pay $$$.
Henry Ng is offline   Reply With Quote
Old 19-05-2018, 12:23 PM   #7
Greater Supremacy Member
 
Illusionist_85's Avatar
 
Join Date: Oct 2002
Posts: 78,614
human is the weakest link sum up all
__________________
水瀬 いのり 東山奈央 悠木碧 工藤晴香 茅野愛衣 早見沙織 伊藤美来
Illusionist_85 is online now   Reply With Quote
Old 19-05-2018, 08:52 PM   #8
Honorary Member
 
mrclubbie's Avatar
 
Join Date: Oct 2008
Posts: 108,935
Yes sometime if unlucky happen to have some playful hacker. Usually they will target bank and company that they can earn $$$. Some can even use ransomware and ask company to pay $$$.
On the other hand, most of the time it is about how we use our devices too
__________________
huat huat huat huat huat huat huat huat
huat huat huat huat huat huat huat huat
mrclubbie is offline   Reply With Quote
Old 19-05-2018, 08:53 PM   #9
Honorary Member
 
mrclubbie's Avatar
 
Join Date: Oct 2008
Posts: 108,935
human is the weakest link sum up all
Agreed with this
__________________
huat huat huat huat huat huat huat huat
huat huat huat huat huat huat huat huat
mrclubbie is offline   Reply With Quote
Old 19-05-2018, 09:16 PM   #10
Senior Member
 
Join Date: Sep 2007
Posts: 810
Malware? What malware?

I have opened up all kinds of dodgy files and my Linux boxes (which have not seen any security updates in 3 years) have stayed immune to everything malware authors can throw at.
Rock-kun is offline   Reply With Quote
Old 20-05-2018, 10:41 AM   #11
Master Member
 
tungsten2's Avatar
 
Join Date: May 2000
Posts: 4,116
because you got nothing that interest them. Haha........
tungsten2 is offline   Reply With Quote
Old 20-05-2018, 12:01 PM   #12
Supremacy Member
 
yusoffb01's Avatar
 
Join Date: Jun 2008
Posts: 8,448
Malware? What malware?

I have opened up all kinds of dodgy files and my Linux boxes (which have not seen any security updates in 3 years) have stayed immune to everything malware authors can throw at.
You must be living under a rock
__________________
There will be a time when gold can be found on Euphrates(river in iraq) and people will kill for it
yusoffb01 is offline   Reply With Quote
Old 20-05-2018, 12:19 PM   #13
Senior Member
 
Join Date: Sep 2007
Posts: 810
You must be living under a rock
I'd rather live under a rock with Linux than give any attention to all the security FUD flooding the news nowadays.

And much of today's Windows malware can be stopped with simple common sense and some changes to the way one uses Windows. Too bad many Windows users clearly lack such knowledge, hence the need to rely on resource-sucking AV tools.

I ran a secondary Vista and Win 7 installation for years with nothing more than the built-in Windows Defender and it was never compromised by malware.
Rock-kun is offline   Reply With Quote
Old 20-05-2018, 12:54 PM   #14
Arch-Supremacy Member
 
Henry Ng's Avatar
 
Join Date: Aug 2011
Posts: 10,686
On the other hand, most of the time it is about how we use our devices too
True, we do not go to site known to be dangerous or any how click.
Henry Ng is offline   Reply With Quote
Old 20-05-2018, 12:59 PM   #15
Arch-Supremacy Member
 
Henry Ng's Avatar
 
Join Date: Aug 2011
Posts: 10,686
I'd rather live under a rock with Linux than give any attention to all the security FUD flooding the news nowadays.

And much of today's Windows malware can be stopped with simple common sense and some changes to the way one uses Windows. Too bad many Windows users clearly lack such knowledge, hence the need to rely on resource-sucking AV tools.

I ran a secondary Vista and Win 7 installation for years with nothing more than the built-in Windows Defender and it was never compromised by malware.
Windows defender also has AV and Ransomware protection and Windows Firewall. You are also using AV tool by Microsoft. The good is it is free.
Henry Ng is offline   Reply With Quote
Reply
Important Forum Advisory Note
This forum is moderated by volunteer moderators who will react only to members' feedback on posts. Moderators are not employees or representatives of HWZ. Forum members and moderators are responsible for their own posts.

Please refer to our Terms of Service for more information.


Thread Tools

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are On