Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP Tech@Work
Today's trends for tomorrow's business
Who is the weakest link

Who's the Weakest Link?

Strengthen your defenses

Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk.
Lack of employee awareness is part of the problem: According to a 2019 study, 66% of business leaders at small to medium-sized businesses don't think they will fall victim to a cyberattack, even though 67% have experienced a cyberattack within the past year. In fact, 18% rank cybersecurity as their lowest business priority. And seven out of 10 believe that passwords are their first line of defense against a security breach.
Understanding what employee actions endanger your business is key to preventing them. Common causes of employee-related cybercrime include:

Social engineering

This plays on employees’ trust to trick them into revealing sensitive information. Tactics include “phishing” (sending an email pretending to be from a vendor, bank, or other trusted source) or “vishing” (calling someone on the phone to obtain sensitive information).

Insider cybercrime

Disgruntled current or former employees with access to your network can wreak havoc.

Downloading malicious files

Employees may carelessly click on links or open email attachments containing malware.

Ignoring or disabling security software

Employees may do this to speed up their computers, access forbidden websites, or install software for personal use.


Thoughtless mistakes such as losing laptops or mobile devices, using weak passwords, sharing passwords with others, or not following security protocols can cause data breaches.

Non-secured services

Employees may use public networks or non-secured cloud-based services such as Dropbox or Gmail to store data, share files, or access email.
With a full understanding of these risks, you can take steps to protect your business by training your employees to take cybersecurity seriously.

Develop a policy for computer, mobile device, and internet use

Communicate the policy and emphasize that adherence is a factor in promotions and performance reviews. Offer incentives for compliance with the policy and for reporting security issues.

Provide mandatory security awareness training for all employees (including executives)

Topics covered should include social engineering, the importance of using strong passwords and keeping them secret, securing mobile devices, and safely using the cloud. Conduct training at least annually—more often if needed.

Restrict employees’ access to sensitive data unless absolutely necessary

Monitor network use and require passwords be reset at least every six months. When employees or contractors leave your business, remove their access immediately.
Despite your best efforts, employees will still make mistakes. Safeguard your business against human error by using technology with native (built-in) security features such as:
  • Remote device management
Lets you manage the security of mobile devices, lock and wipe devices, destroy data on hard drives if a device is lost or stolen, and automatically update or enable firewalls and antivirus software so they’re always current.
Used alone or with passwords, is more secure than passwords and doesn’t slow employees down.
  • Full-disk encryption
Keeps data safe even if a device is lost or stolen.
  • Data protection
Lets you remotely audit, block, and override employees’ attempts to share data.
  • Pull printing
Allows only authorized users to retrieve documents, lessening the risk of employees leaving sensitive documents lying on the printer for prying eyes.

By staying alert to the latest cyberthreats affecting your business, and following the best practices outlined here, you can help protect your business from a potentially devastating data breach.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.


Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by; reseller offers may vary. Items sold by are not for immediate resale. Orders that do not comply with terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license.

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (