TechSperience Solutions Episode 109: PC Security and Today’s Cyber Security Threats


Today’s digital work environment has elevated cyber security risks for organizations. It’s no longer safe to only rely on software-based solutions. This podcast explores why we IT teams should adopt a “zero-trust” mindset and how you can equip your employees with the right tools, software, and training to help protect against costly cyberattacks.

Host: James Hilliard
Guest: Rhett Livengood, Director, Digital Business Enabling at Intel

Show Notes:

[1:00] PC security has evolved drastically since the pandemic. With remote and hybrid work environments the norm today, security risks are even greater. Data breaches are unfortunately more common and can cause detrimental impacts. In a recent report, the average financial loss is $4.2M per breach (IBM). 

[3:36] We’re in a zero-trust environment now. Companies should assume that employees and organizations are being attacked at all times. No links or external data can be trusted. 

[5:00] VPNs are difficult to maintain and manage and are no longer an effective approach to protect employees. Adding more security software slows systems down and don’t lead to a great user experience. 

[6:30] Intel has looked at building security right into the hardware as a solution without slowing down PCs to better support remote and hybrid employees.

[7:10] People are the weakest link when it comes to cyber security. Organizations should implement a recurring training program with reminders about multi-factor authentication, using unique and complex passwords, and paying attention to links. Phishing attacks are getting more sophisticated so highlighting what employees should look out for is key.

[10:05] Security patches should be seamless while also considering employees’ working hours. Offering the user scheduling options is ideal to minimize business interruptions. 

[12:56] Security should be a holistic mindset. It requires consideration of the employee, technology, security threats, and training. Multilayer device protection should include software, application, and hardware.

[15:40] When deploying PCs to employees, IT teams should be mindful about the software that is being loaded. Each program will impact PC performance which, in turn, impacts the employee experience. Work with a partner to effectively integrate software and systems for optimal protection and user experience. 

[18:00] Protecting data involves encryption. Zero-trust applies here too. Nothing can be trusted.

[20:15] Security assessments and audits continue to be in the forefront when it comes to balancing employees’ needs and tools, various work environments, and organizational security protocols.

[23:48] In the future, Artificial Intelligence will play a key role in automating security checks to help minimize user error.