Thank you for visiting the NEW ZEALAND HP Store
Mon-Fri 9.00am - 6.00pm
(exc. Public Holidays)
Mon-Fri 9.00am - 6.00pm
(exc. Public Holidays)
Hackers cannot compromise your software, organisation, or hardware without interacting with your devices, online accounts, and internet connection. Whether you’re working remotely from Auckland, running a small business in Wellington, or studying in Christchurch, your digital security is only as strong as your weakest entry point. While “attack surface” sounds technical, it is a practical security concept everyone should understand.
Reducing your attack surface requires awareness and consistent action, not complex technical expertise. Enable multi-factor authentication (MFA), update software promptly, back up data regularly, use strong unique passwords, and maintain vigilance to establish sound cybersecurity practices.
Your attack surface is the total number of points where attackers can attempt to access your data or systems. Think of it as all the doors, windows, and entry points to your digital life — the more you have, the more opportunities for break-ins.
An attack surface encompasses all vulnerabilities, entry points, and exposure areas — including software flaws, open ports, and user access — that attackers can exploit for unauthorised entry or data theft.
Physical attack surface: Tangible devices and hardware
Digital attack surface: Software, networks, and online accounts
Human attack surface: People and their security behaviours
USB Ports on Your Laptop
Risk: Infected USB drives can install malware when plugged in.
Real-world scenario: An employee finds a “lost” USB drive in a car park, plugs it into a work laptop, and unknowingly installs malicious software.
Impact: Company data is compromised and ransomware is deployed across the network.
Unattended Devices
Risk: Physical access allows password bypass, data theft, or malware installation.
Real-world scenario: A laptop is left unlocked at a café while the owner steps away to order.
Impact: Direct access to email, files, and saved passwords.
Old Devices Not Properly Wiped
Risk: Sold or discarded devices may contain recoverable data.
Real-world scenario: A donated laptop still has login credentials saved in the browser.
Impact: The new owner accesses old email and financial accounts.
Cloud Applications and Services
Risk: Each cloud app represents another potential vulnerability.
Real-world scenario: A small business uses 15 different SaaS tools, each with separate login credentials.
Impact: A 2019 breach affected multiple companies through compromised cloud service providers.
Outdated Software and Operating Systems
Risk: Unpatched vulnerabilities are publicly documented and easily exploited.
Real-world scenario: A Windows PC runs without security updates for several months.
Impact: The WannaCry ransomware in 2017 primarily affected systems without updates.
Public Wi-Fi Networks
Risk: Unencrypted connections allow traffic interception.
Real-world scenario: A remote worker conducts financial transactions over airport Wi-Fi.
Impact: Credentials are captured by an attacker on the same network.
APIs and Integrations
Risk: Connected services can become entry points if one is compromised.
Real-world scenario: A fitness app integrates with email, social media, and health records.
Impact: One compromised integration exposes data across multiple platforms.
New Zealand’s growing number of hybrid and remote workers means more devices are connecting from home networks and public hotspots than ever before — making awareness of the digital attack surface especially important. If you’re considering upgrading to a more secure device, explore HP laptops designed with built-in security features.
Phishing Emails
Risk: Social engineering tricks people into revealing credentials or installing malware.
Real-world scenario: An “urgent security alert” email appears to come from the IT department.
Impact: An employee clicks the link, enters their password on a fake login page, and grants access to an attacker.
Weak or Reused Passwords
Risk: One compromised password exposes multiple accounts.
Real-world scenario: Using the same password for email, banking, and social media.
Impact: A data breach at one service exposes credentials usable across all accounts.
Oversharing on Social Media
Risk: Public information helps attackers craft convincing targeted attacks.
Real-world scenario: Posting about holiday plans and employer details publicly.
Impact: Attackers use the information to impersonate IT support or send targeted phishing.
Simple actions anyone can implement today with minimal technical knowledge.
What it is: A second verification step beyond your password — such as a code sent to your phone or a fingerprint scan.
Why it works: Even if a password is stolen, an attacker cannot access the account without the second factor.
How to implement: Enable it in settings for email, banking, and social media (takes 5 to 10 minutes per account).
Impact: Blocks 99.9% of automated account compromise attempts.
What it is: Installing the latest versions of operating systems and applications.
Why it works: Updates patch known security vulnerabilities that attackers exploit.
How to implement: Enable automatic updates for Windows, apps, and antivirus software — set once, updates automatically.
Impact: Protects against the majority of common exploits.
What it is: Different complex passwords for each account.
Why it works: Compromise of one account does not expose others.
How to implement: Use a password manager, such as the built-in Windows or Chrome manager, or a dedicated app.
Impact: Prevents credential stuffing attacks across platforms.
What it is: Requiring a password or PIN to wake the computer or phone.
Why it works: Prevents physical access to your data.
How to implement: Set automatic lock after 5 minutes of inactivity (Windows Settings > Accounts > Sign-in options).
Impact: A simple barrier that stops opportunistic access.
What it is: Deleting old accounts and uninstalling unused software.
Why it works: Fewer active accounts means fewer potential entry points.
How to implement: Conduct a monthly audit of installed apps and online accounts, and delete what you don’t use.
Impact: Directly reduces the size of your attack surface.
More involved steps that require some initial setup but provide substantial protection.
What it is: Separating devices onto different network levels — for example, a guest network for IoT devices and a main network for computers.
Why it works: A compromised smart TV cannot access your work laptop if it’s on a separate network.
How to implement: Configure a guest network on your router for IoT devices and keep critical devices on the main network.
Difficulty: Moderate — requires router configuration, but most modern routers support this.
Impact: Contains breaches to specific network segments.
What it is: Limiting who can access what data and systems, following the principle of least privilege.
Why it works: Even a compromised account has limited damage potential.
How to implement:
Difficulty: Moderate — requires planning and initial setup.
Impact: Limits the scope of successful attacks.
What it is: An encrypted tunnel for internet traffic, especially useful on public networks.
Why it works: Prevents traffic interception and masks your IP address.
How to implement: Install VPN software or use the built-in Windows VPN.
Difficulty: Low to moderate — subscription cost involved, but setup is straightforward.
Impact: Protects your data on untrusted networks.
For New Zealand professionals who work across multiple locations or frequently travel between cities, a reliable business laptop with built-in security tools can make a meaningful difference to your daily protection.
What it is: Automated copies of important files stored separately from your primary device.
Why it works: Ransomware and data loss cannot hold you hostage if you have clean backups.
How to implement: Use cloud backup (such as OneDrive or Google Drive) or an external drive with automatic scheduling.
Difficulty: Low — set up once and it runs automatically.
Impact: Restores your recovery capability if an attack succeeds.
HP devices come with a suite of built-in security tools that work quietly in the background:
How to implement: Check the HP Security dashboard on your device and enable the available features.
Impact: Multi-layered defence specifically designed for HP hardware.
Comprehensive approaches for those managing significant risk or sensitive data.
What it is: A “never trust, always verify” approach in which every access request is authenticated.
Why it works: It assumes a breach has already occurred, limiting lateral movement within the network.
How to implement: Requires infrastructure changes — continuous authentication and micro-segmentation.
Difficulty: High — best suited for businesses or technically advanced users.
Impact: The most robust protection available.
What it is: Tracking all access attempts and system changes for anomaly detection.
Why it works: Early detection enables rapid response before major damage occurs.
How to implement:
Difficulty: High — requires ongoing attention and analysis.
Impact: Converts reactive security into proactive threat hunting.
What it is: Simulated attacks designed to identify vulnerabilities before attackers do.
Why it works: Finds weaknesses in a controlled environment so they can be remediated.
How to implement: Engage security professionals for annual testing — typically relevant in a business context.
Difficulty: High — requires expertise and budget.
What it is: Physical devices required for account access, using FIDO2 or U2F standards.
Why it works: Phishing-resistant — attackers cannot remotely steal a physical key.
How to implement: Purchase security keys such as YubiKey or Google Titan, then register them with your critical accounts.
Difficulty: Moderate — a one-time setup cost with straightforward implementation.
Impact: The strongest authentication method currently available.
For businesses looking to equip their teams with secure, enterprise-ready hardware, browse HP’s range of business desktops and mobile workstations built with security at their core.
Attack vector: An employee clicked a phishing email on an unpatched Windows system.
Attack surface factors: Outdated software, no MFA, and inadequate email filtering.
Consequence: A $50,000 ransom demand, one week of downtime, and exposed customer data.
Lesson: Basic security hygiene — updates combined with MFA — would have prevented the breach.
Attack vector: A weak router password on a home network.
Attack surface factors: Default router credentials were never changed, and smart home devices shared the same network as work devices.
Consequence: An attacker accessed the work laptop through the network and stole intellectual property.
Attack vector: Password reuse across services.
Attack surface factors: The same password was used for both a shopping site and a business email account.
Consequence: A shopping site breach led to business email compromise and fraudulent transactions.
Lesson: Unique passwords per account are critical — a password manager solves this effectively.
New Zealand’s CERT NZ — the government’s Computer Emergency Response Team — consistently highlights credential compromise and phishing as the leading threats facing Kiwi households and businesses. Taking the steps outlined in this article directly addresses the vulnerabilities most commonly exploited in the New Zealand context.
Small and medium-sized businesses in New Zealand are particularly attractive targets because they often hold valuable customer and financial data but may lack the IT resources of larger enterprises. Investing in secure hardware and practising good cyber hygiene are two of the most cost-effective steps any business can take.
If your organisation is ready to invest in more secure devices, explore HP’s dedicated HP for Business solutions, including a wide range of laptops, desktops, and accessories built with enterprise-grade security in mind.
Is it possible to completely eliminate my attack surface? No. Completely eliminating the attack surface is impossible in functional systems, as connectivity and features inherently create vulnerabilities. The goal is constant reduction.
Do I really need to worry about attack surfaces as an individual? Yes. Individuals face attack surface risks from devices, apps, and accounts. Simple exploits like phishing target personal data every day.
How do I balance security with convenience? Prioritise simple measures like MFA and regular updates — they protect without creating significant hassle.
Are HP laptops more secure than other brands? HP devices offer strong security features like HP Sure View screens and HP Wolf Security, often providing better protection for business use compared to competitors.
What’s the single most important thing I can do? Enable MFA on all accounts. This single step blocks the vast majority of automated account compromise attempts.
Reducing your attack surface is an ongoing process. Threats evolve, new assets emerge, and vulnerabilities arise continuously — requiring regular monitoring, pruning of exposures, and adapting your defences.
Small, consistent actions build strong habits that cumulatively reduce vulnerabilities and risks over time. Regular steps like prompt software updates patch vulnerabilities before they can be exploited. These habits foster a proactive security culture that minimises the human errors responsible for the majority of breaches.
Start with the Quick Wins outlined above — MFA and software updates offer fast, low-effort defences. From there, explore HP’s built-in security features designed to reduce your attack surface at the hardware level.
Ready to upgrade to a device built with security in mind? Browse HP laptops and HP desktops available now in New Zealand.
Mon-Fri 9.00am - 6.00pm
(exc. Public Holidays)
Mon-Fri 9.00am - 6.00pm
(exc. Public Holidays)