4 reasons why HP Elitebooks offer extraordinary resistance to hackers


Security is a top-line issue for any IT manager. For businesses in sectors such as government, health, law and finance, system breaches are an existential threat that can not only destroy reputations but entire companies.

The rise of remote working, enabled by today’s powerful personal computing devices, has widened the risk profile for IT systems. Now, every personal computing decision made by a business is a security decision.

HP is aware of this step-change in security risk and has made it a priority to integrate essential security features into the hardware of its flagship EliteBook range. These elite PCs and workstations, with Intel Core processors, are built to protect businesses from ever-evolving threats.

Four key security features are built into HP EliteBook computers to protect them from a variety of security risks, ranging from unwanted glances at computer screens to sophisticated basic input/output system (BIOS) attacks.

These security features, which are enforced by hardware for stronger protection, are: Sure View, Sure Start, Sure Run, and Sure Recover. Together, they dramatically increase system resilience.

Sure view – protect your screen

Now that staff are more often working remotely from public spaces, screen security has become a front-of-mind issue for businesses and organisations in sectors that deal with sensitive information.

When working on a laptop in a public area such as a cafe on an important business deal, it is vital to be discreet. Could the person sitting behind you have caught a glimpse of your screen? Are they straining to see more? The integrity of the deal could be in jeopardy if the information falls into the wrong hands.

To combat this risk, Sure View is an integrated PC privacy screen that can be activated at the press of a button. It makes your EliteBooks screen appear dark to those around you without restricting your own visibility. It’s a deceptively simple and effective protection against visual hacking.

Sure Start – automatic recovery in case of attack

BIOS code starts up your computer when you push the power button. It also manages inputs from devices such as the mouse and keyboard. It’s otherwise known as ‘firmware’ because it is permanently written into the device’s read-only memory.

Firmware is a prime target for hackers because it allows access to a computer from outside its operating system. Once malicious actors infiltrate a system’s firmware, it is difficult to get them out, and hard to detect them there in the first place.

It took hackers years to work out how to access the BIOS system, but today easy-to-use tools are readily available in the public domain. Opening a single email attachment containing malware is enough to compromise the firmware on a device.

HP Sure Start uses a suite of security features that automatically detect, stop and recover from a BIOS attack or corruption without IT intervention. It provides cutting-edge protection against firmware attack and it is being constantly updated by the HP security team to protect from new threats.

Sure Run – inbuilt resilience to malware

Hackers are developing ever more ingenious ways to entice computer users to open links to malicious software. They will assume identities of prominent people within businesses, create fake invoices, and even send fake birthday cards in the guise of friends and family.

Even the most careful users can be fooled, and all it takes is one mistake to open the door to a piece of malware or ransomware that could compromise the operations of an entire business.

HP Sure Run is hardware-enforced protection for communications between key security processes and products that are key targets of many malicious attacks.

It also monitors applications, processes, policy settings and operating system functionality and can restart critical services. It’s a last line of defence protects your systems security.

Sure Recover – quick restoration

In the unlikely event that your PC has a complete meltdown due to a cybersecurity breach, Sure Recover will recover your operating system from a network connection without the need for recovery software to be present on the machine.

It’s an insurance policy that you hope you never need, but it also doubles as a useful tool for IT system administrators if they need to re-image an operating system for practical reasons, such as initial system installations.

To get advice on cutting-edge IT security protections and the strong in-built safety in the HP Elitebook range, contact Think IT at www.ThinkIT.co.nz or phone (09) 636 0900.

Think IT

Graeme Rawlings
“Customer service is not a department, it’s everyone’s job”

Graeme Rawlings
Think I.T. Team


Are your employees up to date on their security awareness?

Cyberwarfare is a part of a new reality as evidenced by the distributed denial-of-service (DDoS) attacks targeting the websites of the Ukrainian defence ministry, army, and two of the country’s largest banks several days before the Russian invasion. These were the most significant attacks of this kind the country has ever faced, according to government officials. The U.S....  more...