Protection for terminals

Human error and new business practices – especially those related to remote access and mobility – are often blamed for cybersecurity failures. The security of your workstations is becoming a major and sensitive issue because it affects the IT health of everyone in your company.

Between the screen and the chair: the weak point in your IT security?

Any of your employees, while sitting calmly at their workstation, can act in a way that causes an infection or compromises your data. How? For example, just by clicking a corrupted link in an email (phishing). Lack of attention, carelessness or a unconsidered click, and the front door to your system is wide open.

Regardless of the form of the cyber attack (spear phishing, watering hole, etc.), the basic method remains the same: tricking one of your employees and leading them, without their knowledge, to commit an action that will install malware on their workstation and provide access to your network.

Removable media and mobile employees: other sources of threats

Although the Internet remains the most prevalent vector for computer threats, you must also protect your network from the risks of infiltration or malware infection presented by removable media: USB keys or external disks, as well as the mobile workstations of your employees, or even your service providers. After all, if they fail to follow the essential rules of good IT hygiene, mobile employees increase the risk of infection for their equipment.

Removable media: beware of cascading malware

Removable media, by their very nature, are designed to be installed and then connected, disconnected and reconnected to different computers according to users’ needs, to exchange data. And in doing so, they can potentially transmit malware to various devices, which are themselves connected to the company’s network and can pass on infections.

Mobile employees: varying levels of security

In the course of their duties, mobile employees are required to work with their laptop, tablet or mobile phone, involving connections in locations that offer varying levels of security. This is particularly true when using a guest’s internet network (which can be shared with other entities), their home internet network or open Wi-Fi networks (in a cafeteria or hotel, etc.).

Their connection can then be intercepted, exposing their data to theft or making their computer a target for malware. In the latter case, there is a danger that the employee may spread malware to the company’s computer network when logging in again with the infected computer.

Stormshield Endpoint Security: a dynamic, reliable protection solution for your workstations

To address these issues, our teams have developed the Stormshield Endpoint Security (SES) range. This standalone protection is capable of dynamically adapting its security operations according to its environment. And at the same time, it analyses access to applications and company resources in response to the location of the workstation.

Are you wondering about the cyber risks that threaten your employees’ workstations? Would you like to know how you could protect them better? Contact our sales and pre-sales teams to find out about best practice and the solutions you need to implement within your company.