HP Tech@Work
Today's trends for tomorrow's business
Concerning Remote Workers and Security

Should You Worry About Security?

A few ideas on remote work and security

If your company is facing an extended period of working from home, it’s important to give your team the very best tools and flexibility to do their jobs outside of traditional offices. And having a good telecommuting policy is important even when it’s business as usual, since nearly 75 percent of small business teams are expected to have remote workers by 2028.

The challenge with allowing employees to do their jobs off-site is that you can’t assume the cybersecurity implications are the same as if they were connecting from inside an office. They’re not.

Anytime someone connects to a network from outside its secure firewall, they’re creating a world of potential vulnerabilities that can lead to cyberattacks. In fact, a recent Open VPN study found one in three organizations (36 percent) have already dealt with such incidents due to unsecured remote devices.

If you’re able to overcome such security hurdles, the benefits to your organization and its employees can be quite high. Your workers won’t have to endure long daily commutes, sit in small cubicles or deal with daily office distractions. As a result, studies show these remote employees can be more productive. You need a strong security action plan in place for the endpoint devices your business buys and the policies it implements.

Deploying Secure Devices

The first thing to keep in mind with this plan is that you can’t go about cybersecurity one-dimensionally. Security experts say it’s critical to have a layered defense, which means securing anything and everything that can be reached through a network connection.

Most small business owners know they have to update their software systems every now and then to the latest security fixes, and they also understand the importance of anti-virus and firewall software. But few pay enough attention to the endpoint devices themselves. Those PCs, laptops, and printers have hardware that can be targeted at a core BIOS level just as easily as any software program.

This is where many remote workers’ devices are likely to be the most prone because hackers tend to attack the points of least resistance on a network, which is probably why 42 percent of IT professionals surveyed say they have suffered a breach on their endpoints.

The good news is that businesses can minimize such attacks by purchasing computers with built-in security features, rather than relying on software add-ons. Yes, you might spend a little bit more. But the peace of mind they offer could offset the cost of a catastrophic cybersecurity event.

For example, HP Sure Start, available on certain laptops and notebooks, can automatically detect, stop and recover from any attack against BIOS, which is a program that gets a computer started before the operating system takes over. HP Sure Click can also help protect your remote PCs from web sites and attachments infected with malware, ransomware and viruses.

In addition, HP Sure Sense can help block previously unknown malware using artificial intelligence (AI). And business owners might also want to consider HP Sure View, an integrated privacy screen that makes it difficult for cyber thieves to see what your employees are viewing while they’re working in public places.

Security Policy Priorities

All of these security features can be massively helpful in heading off potential cyberattacks, but none of that will matter if you don’t also have thoughtful security policies in place.

For instance, while roughly 90 percent of small business owners know weak or outdated passwords pose a serious security risk, nearly 60 percent polled admit they’re not doing much about the problem. That’s got to change in a remote world. As a matter of policy, you should require employees to adopt strong passwords—consisting of capital letters, numbers and symbols—and change them every 90 days.

Because passwords aren’t the most reliable or secure identity and access practice, you should also consider adopting two-factor authentication. This is where employees must input more than one piece of information—such as a password and thumbprint or a smartcard and pin—to log into a network.

One other point to keep in mind is that your network printer can also be a vulnerable endpoint device. They’re just as connected to the outside world as any PC, so if they don’t have built-in security features, they could create a problem. Employees sometimes print documents to them and forget to pick them up, leaving them out in the open for any passerby to steal.

To avoid this scenario, consider investing in “pull printing” capabilities, where employees print to a queue and can only retrieve documents using personally identifiable credentials.

Summary

The workforce is changing dramatically, presenting unprecedented opportunities for flexibility and convenience. While this new reality presents numerous cybersecurity challenges, that doesn’t mean small businesses should stand still. With a thoughtful approach toward technology purchasing and policies, it’s possible to take full advantage of digital progress—safely and securely.

Thinking about putting new technology to work for your business but not quite sure where to start? Let an HP business expert help. They’ll work with you to identify the right technology for your business now and into the future, can assist with custom configurations, flexible financing options and much more.

Related content you might enjoy:

Read the latest PC Security offering announcement from HP - no cost solutions for your business.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

More about these products
Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)