Ten ways to protect company workstations against cyberattacks

Ten ways to protect company workstations against cyberattacks

Company workstations are the favourite target of cyberattacks. Implementing quick and easy tips for protecting your employees' workstations is one of the key measures for securing your infrastructure. Top 10 effective measures to adopt.

If workstations are poorly protected, the company runs the risk of having its confidential data stolen via hacking. More importantly, workstations can become attack gateways to reach more sensitive systems within the company. There are some simple measures which you can apply to guard against these risks.

  1. Make employees aware of how to protect their workstations. This campaign focuses on theft, unlawful access, regular data backup and good email management (most common means by which to be hacked).
  2. Check that automatic updating of the operating systems is properly activated.
  3. Carry out application updates if not done automatically.
  4. Delete unused applications which, over time, may contain security loopholes.
  5. Delete default services that are not used, such as .NET Framework or the “Microsoft Print to PDF” function in Windows.
  6. Regularly change and strengthen passwords.
  7. Install an anti-virus or attack detection tools.
  8. Take account of the list of programs provided by Microsoft but considered to be potentially dangerous. Example: the Excel calculation program.
  9. Encrypt sensitive data storage media, starting with laptop hard drives.
  10. Install an EPP (Endpoint Protection Platform) for enhanced protection. For example: with application or device control.

Employees are not always aware of the risks, to them or to the company, caused by a poorly secured workstation. It is, therefore, essential to explain this properly to them and to show them good habits to adopt, e.g. by sharing this list with them!

Share on

If you experience targeted or sophisticated attacks, additional and appropriate defence measures must be deployed. Stormshield Endpoint Security monitors and blocks in real time any suspicious behaviour in programs (e.g. memory access, keyloggers and exploitation of vulnerabilities), including the improper use of genuine software.

About the author

mm
Victor Poitevin
Digital Manager, Stormshield

Victor Poitevin is Stormshield’s Digital Manager. Attached to the Marketing Department, his role is to improve the Group’s online visibility. This involves Stormshield’s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group’s high digital aspirations.