Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
HP Security Checklist

HP Security Checklist

Ratings: (0)|Views: 308|Likes:
Published by Hewlett-Packard

More info:

Categories:Types, Business/Law
Published by: Hewlett-Packard on Sep 01, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Reducing the security risks to your business
There is no question that IT security is becoming more important everyyear. As we learn to monetise our data and our business connections,our assets and
vulnerabilities grow apace. If you’re not sure where toget started drawing up your company’s cyber security strategy, use our
checklist as a quick-start guide.
Intel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation inthe U.S. and/or other countries.
Safe business, good business
Safe business, good business
Data is the lifeblood of your business. Your customer records, accounts, employee information,correspondence, email
imagine what would happen if you lost it all or it fell into the hands of your biggestcompetitor? It can happen. For example, new data from Intel suggests that one in 12 business notebooks
will be lost or stolen. So, we’ve put together this guide to keepi
ng your business safe by keeping your datasafe.
Getting started
If you want to stay safe, you need a good security plan. Make sure that the rough draft of your plan
includes these basic points. You won’t write a perfect security policy in your first attem
pt, so scheduleregular meetings to discuss and revise your plan.
Client-side basics:
Install anti-virus software, check your firewalls and enable automatic softwareupdates on all of your corporate PCs. Microsoft Security Essentials provides real-time protection for your home or small business PCs against viruses, spyware and other malicious software. It is easy toinstall and free for small businesses with up to 10 PCs, providing they are running genuineWindows. 
Server-side security:
Maintaining a secure server requires qualified IT personnel, but you can doyour part by helping them plan. Ask your IT department how they detect unauthorised access, whatplans are in place to deal with security lapses and how they stay informed of developments withinthe security community.
Staff policies:
Your staff will be responsible for enacting your security policies day in, day out. Yoursecurity plan should explicitly lay out expectations, including who will conduct IT security trainingsand who should monitor team members for compliance.
Up-to-date hardware:
PCs that are four years old are 54 percent more likely to have security
incidents than PCs that are less than one year old. Upgrading to a new computer doesn’t just mean
you will have a faster processor and more memory, security features will actually become moreeffective. For instance, Intel® Turbo Boost Technology
intelligently allocates processing power andhyper-threading technology lets each processor core work on two tasks at once, allowing users torun virus scans faster and with less interruption.
Intel® Turbo Boost Technology available on the Intel® Core™ i7 processor and the Intel® Core™ i5 processor only. Intel®
Turbo Boost Technology requires a PC with a processor with Intel Turbo Boost Technology capability. Intel Turbo BoostTechnology performance varies depending on hardware, software, and overall system configuration. Check with your PCmanufacturer on whether your system delivers Intel Turbo Boost Technology. For more information, seehttp://www.intel.com/technology/turboboost. 
Safe business, good business
Get help:
If no-
one on your team has the right expertise, don’t be afraid to get outside help. Youwouldn’t ask your employees to just take their best guess on legal or accounting issues
you wouldget expert help if it was necessary
and you should approach security the same way. In the longrun, you should consider training some of your employees so that you have in-house securityexperts when problems arise.
Ten essential security features on new HP Notebooks
The latest HP Business Notebooks come with HP ProtectTools pre-
installed. It’s free andit’s essential if you want to keep your data and your notebook safe from thieves and
prying eyes.
Drive encryption.
HP ProtectTools uses the best way to protect the informationon your hard drive. Even if a thief removes the hard disk from your notebook, they still
can’t read the data on it.
Face recognition.
Use the webcam on your notebook to recognise your face as a password to
access your computer. It’s quick, easy an
d secure.
Fingerprint scanner.
Many HP Notebooks come witha built-in fingerprint scanner
a secure, easy way tolog into your computer without having to remembera password.
HP Credential Manager.
Use this to log into yournotebook with a single password, smart card,fingerprint swipe or facial recognition and then haveit remember all your other passwords for you.
HP enhanced pre-boot security.
HP ProtectToolsoffers enhanced, multi-user pre-boot security. Youhave the option to create a Windows user and a pre-boot user, along with multi-factor authenticationthat uses any combination of password, smart cardand biometrics.
HP SpareKey.
Users lose and forget passwords all thetime. HP SpareKey adds credential recoverycapability into the BIOS, so users can regain access totheir laptops without involving IT administrators.
HP File Sanitizer.
Permanently deletes files, foldersand identity information from laptops and desktops
to help protect users’ personal information.
HP Disk Sanitizer.
Completely remove unwanteddata from hard drives with HP Disk Sanitizer. Perfectfor when you need to hand your notebook over to someone else
a new user or when you recycleit at the end of its life.
Added security from Intel®
Many HP Notebooks are available with2
generation Intel® Core™ vPro™
processor technology and this makesthem extra-secure.The 2nd generation Intel Core vProprocessor family offers intelligent,hardware-assisted security featuresthat help you quickly deploy securitypatches across PCs, remotely unlockencrypted drives, and manage datasecurity settings, even when the PC isoff.
You can also help protect yourorganization's sensitive data withoptional Intel® Anti-Theft Technology(Intel® AT). 

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Kishan Patel liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->