Hardware, Firmware Neglect Poses Serious Security Issues: HP Wolf Security Report

Issues with configuring, on-boarding, procuring and disposing of devices plague many organizations, a new report from HP Wolf Security reveals.

A new report from HP Wolf Security reveals that organizations are neglecting to secure endpoint devices at every stage of the device’s life cycle—and how failing to do so has major cybersecurity implications.

The report focuses on five stages of a device’s life cycle: supplier selection, on-boarding and configuration, ongoing management, monitoring and remediation, and second life decommissioning.

[Related: 14 Network And Security Vendors That Target The Midmarket]

The data is based off a global study of more than 800 IT and security leaders and over 6,000 “work-from-anywhere” employees, according to the report.

Some key takeaways from the report’s findings:

IT and security leaders also had frustrations surrounding procuring and on-boarding devices. A majority (78 percent) said they want zero-touch on-boarding through the cloud to include hardware and firmware security configuration.

[Related: The 2024 MES Midmarket 100: Top Companies Serving The Midmarket]

"Buying PCs, laptops or printers is a security decision with long-term impact on an organization’s endpoint infrastructure. The prioritization, or lack thereof, of hardware and firmware security requirements during procurement can have ramifications across the entire lifetime of a fleet of devices—from increased risk exposure, to driving up costs or negative user experience—if security and manageability requirements are set too low compared to the available state of the art,” said Boris Balacheff, chief technologist for security research and innovation at HP Inc., in a news release.

"It’s essential that end-user device infrastructures become resilient to cyber risks. This starts with prioritizing the security of hardware and firmware and improving the maturity of how they are managed across the entire lifecycle of devices across the fleet,” Balacheff added.

HP offered several recommendations for organizations to tackle these challenges:

Read the full findings and more recommendations in HP’s “Securing the Device Lifecycle: From Factory to Fingerprints, and Furure Redeployment” report here.