Workstations

A poorly configured desktop or laptop could allow an employee to deliberately or unwittingly bypass security settings or ignore security updates, leading to an otherwise avoidable security incident. A desktop is the typical starting point for a malicious employee or contractor to launch an internal attack or remove business critical data from the network.

It is also the device through which staff interact with the outside world and may expose themselves and the organisation’s data to attacks within permissible content by visiting dangerous web sites, opening malicious attachments or falling for phishing or other scams.

Thin as well as thick clients should be reviewed; if a flaw or vulnerability is inherent within a thin client roll out, this will be pushed to each and every user.

Topics such as active directory controls, the ability to escalate domain access, AV/malware capability, removable media and hard disk encryption are all considered.