IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Analysis

The evolving threat landscape

How can you protect against an ever evolving attacker?

Keeping your office computing systems secure is a constantly moving target. In this video, HP's Head of Security Lab Simon Shiu and some real-world business IT users explain what kind of threats they are looking out for now and in the future. In particular, cybercrime is now an economy that can generate huge amounts of money, making the incentives for criminals to keep developing their tactics very considerable. Protection starts with ensuring systems are fully patched, but also includes keeping an eye on new legal provisions, in particular the EU's General Data Protection Regulation (GDPR), which aims to give control of personal data back to citizens and increases the fines for not doing so.

In the same way that new business ideas can become hits almost overnight for example the rapid onslaught of new social media and chat applications innovative threats can enjoy similarly speedy success. A very sophisticated piece of malware that proves successful can spawn lots of derivatives that multiply the danger very quickly. Although the original code might have taken considerable expense and expertise to develop, once this has a proven track record, it will easily be copied and customised. This is why HP focuses strongly on researching new threats, so that these can be combated with new security strategies as soon as they are encountered on corporate networks.

Find out how HP can protect your business against the evolving threat landscape.

Featured Resources

AI for customer service

IBM Watson Assistant solves customer problems the first time

View now

Solve cyber resilience challenges with storage solutions

Fundamental capabilities of cyber-resilient IT infrastructure

Free Download

IBM FlashSystem 5000 and 5200 for mid-market enterprises

Manage rapid data growth within limited IT budgets

Free download

Leverage automated APM to accelerate CI/CD and boost application performance

Constant change to meet fast-evolving application functionality

Free Download

Recommended

How to react to a data breach
Security

How to react to a data breach

14 Nov 2022
How to trust your inbox with Cloudflare Area 1
Whitepaper

How to trust your inbox with Cloudflare Area 1

19 Oct 2022
Best antivirus for Windows 10
antivirus

Best antivirus for Windows 10

13 Oct 2022
Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs
exploits

Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs

12 Sep 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
Windows users now able to run Linux apps and distros natively
Microsoft Windows

Windows users now able to run Linux apps and distros natively

24 Nov 2022