GlobeNewswire Inc.
December 12, 2024 9:00AM GMT
The report highlights cybersecurity challenges facing organizations across the lifecycle of their endpoint devices – from supplier audit failures to weak BIOS passwords, Fear of Making Updates (FOMU), a $8.6bn lost/stolen device epidemic, and growing e-waste
PALO ALTO, Calif., Dec. 12, 2024 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today released a new report highlighting the far-reaching cybersecurity implications of failing to secure devices at every stage of their lifecycle. The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come.
The report, based on a global study of 800+ IT and security decision-makers (ITSDMs) and 6000+ work-from-anywhere (WFA) employees, shows that platform security is a growing concern with 81% of ITSDMs agreeing that hardware and firmware security must become a priority to ensure attackers cannot exploit vulnerable devices. However, 68% report that investment in hardware and firmware security is often overlooked in the total cost of ownership (TCO) for devices. This is leading to costly security headaches, management overheads and inefficiencies further down the line.
Key findings from across the five stages of the device lifecycle include:
"Buying PCs, laptops or printers is a security decision with long-term impact on an organization’s endpoint infrastructure. The prioritization, or lack thereof, of hardware and firmware security requirements during procurement can have ramifications across the entire lifetime of a fleet of devices – from increased risk exposure, to driving up costs or negative user experience – if security and manageability requirements are set too low compared to the available state of the art,” warns Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.
Balacheff continues: "It’s essential that end-user device infrastructures become resilient to cyber risks. This starts with prioritizing the security of hardware and firmware and improving the maturity of how they are managed across the entire lifecycle of devices across the fleet.”
From factory to fingertips – oversights in the supplier selection process, and onboarding and configuration limitations, impact device security across the lifecycle
The findings highlight the growing need for IT and security to be part of the procurement process for new devices, to set the requirements and verify vendor security claims:
IT professionals are also concerned about the limitations of their ability to onboard and configure devices down to the hardware and firmware level seamlessly.
“You will always need to choose technology providers you can trust. But when it comes to the security of devices that serve as entry points into your IT infrastructure, this should not be blind trust,” comments Michael Heywood, Business Information Security Officer, Supply Chain Cybersecurity at HP Inc. “Organizations need hard evidence – technical briefings, detailed documentation, regular audits and a rigorous validation process to ensure security demands are being met, and devices can be securely and efficiently onboarded.”
Challenges and frustrations around the ongoing management, monitoring and remediation of devices
71% of ITSDMs say the rise in work-from-anywhere models has made managing platform security more difficult, impacting worker productivity and creating risky behaviors:
Monitoring and remediating hardware and firmware threats to prevent threat actors accessing sensitive data and critical systems is vital. However, 79% of ITSDMs say their understanding of hardware and firmware security lags behind their knowledge of software security. Moreover, they lack mature tools that would give them the visibility and control they would want to manage hardware and firmware security across their fleets:
“Post-breach remediation is a losing strategy when it comes to hardware and firmware attacks,” warns Alex Holland, Principal Threat Researcher in the HP Security Lab. “These attacks can grant adversaries full control over devices, embedding deep within systems. Traditional security tools are blind to these threats as they tend to focus on the OS and software layers, making detection nearly impossible. Preventing or containing these attacks in the first place is critical to stay ahead, or else organizations risk a threat they cannot see – and cannot remove.”
Second life and decommissioning – how data security concerns are leading to an e-waste epidemic
Platform security concerns are also impeding organizations’ ability to reuse, recycle or resell end of life devices:
Complicating matters further, many employees sit on old work devices. This not only prevents devices from being repurposed, but it also creates data security risks around orphaned devices that still may carry corporate data.
“IT teams are hoarding end-of-life devices because they lack the assurance that all sensitive company or personal data has been fully wiped - which in itself can pose data security risks and negatively impact ESG goals. Finding a reputable IT asset disposition vendor that uses the latest industry-standard erasure or media-destruction processes and provides a data sanitization certificate so you can meet compliance requirements, is key,” comments Grant Hoffman, SVP Operations and Portfolio, HP Solutions.
A new approach to the device lifecycle is needed to improve platform security
More than two thirds (69%) of organizations say their approach to managing device hardware and firmware security only addresses a small part of their lifecycle. This leaves devices exposed, and teams unable to monitor and control platform security from supplier selection to decommissioning.
To manage platform security across the entire lifecycle, HP Wolf Security’s recommendations include:
For further insights and recommendations download the full report ‘Securing the Device Lifecycle: From Factory to Fingertips, and Future Redeployment’ here.
About the data
About HP
HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: http://www.hp.com.
About HP Wolf Security
HP Wolf Security is world class endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit https://hp.com/wolf.
i The global lost/stolen laptop epidemic figure was reached by taking the average number of laptops reported lost/stolen in the last year (103) by ITSDMs and the average cost of each lost/stolen laptop ($2,272). This comes to $234,119. The cost is then extrapolated across the number of large organizations (with 1,000+ employees) in the same territories as the research scope:
In total, there are 36,923 large organizations. If each lost 103 laptops at an average cost of $2,273 ($234,119) then the global cost of lost/stolen laptops is $8,644,375,837.
Media Contacts
HP Media Relations
MediaRelations@hp.com
hp.com/go/newsroom