share_log

HP Wolf Security Study Reveals Platform Security Gaps That Threaten Organizations at Every Stage of the Device Lifecycle

HP Wolf Security Study Reveals Platform Security Gaps That Threaten Organizations at Every Stage of the Device Lifecycle

HP Wolf安防-半導體研究揭示了在設備生命週期的各個階段威脅組織的平台安全漏洞。
GlobeNewswire ·  12/12 17:00

The report highlights cybersecurity challenges facing organizations across the lifecycle of their endpoint devices – from supplier audit failures to weak BIOS passwords, Fear of Making Updates (FOMU), a $8.6bn lost/stolen device epidemic, and growing e-waste

該報告突出了在整個終端設備生命週期中組織面臨的網絡安全挑戰——從供應商審計失敗到薄弱的BIOS密碼、對更新的恐懼(FOMU)、86億美元的丟失/被盜設備疫情,以及不斷增長的電子廢物。

PALO ALTO, Calif., Dec. 12, 2024 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today released a new report highlighting the far-reaching cybersecurity implications of failing to secure devices at every stage of their lifecycle. The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come.

加利福尼亞州帕洛阿爾託,2024年12月12日(全球新聞通訊)——惠普(紐交所:HPQ)今天發佈了一份新報告,強調在每個生命週期階段未能確保設備安全的廣泛網絡安全影響。研究結果表明,平台安全——確保PC、筆記本電腦和打印機的硬件和固件安全——往往被忽視,導致未來網絡安全態勢薄弱。

The report, based on a global study of 800+ IT and security decision-makers (ITSDMs) and 6000+ work-from-anywhere (WFA) employees, shows that platform security is a growing concern with 81% of ITSDMs agreeing that hardware and firmware security must become a priority to ensure attackers cannot exploit vulnerable devices. However, 68% report that investment in hardware and firmware security is often overlooked in the total cost of ownership (TCO) for devices. This is leading to costly security headaches, management overheads and inefficiencies further down the line.

該報告基於對800多名IT和安全決策者(ITSDMs)以及6000多名隨時辦公(WFA)員工的全球研究,顯示平台安全正日益受到關注,81%的ITSDMs同意硬件和固件安全必須成爲優先事項,以確保攻擊者無法利用脆弱的設備。然而,68%的人報告在設備的總擁有成本(TCO)中,硬件和固件安全的投資往往被忽視。這導致了昂貴的安全頭痛、管理負擔和進一步的低效率。

Key findings from across the five stages of the device lifecycle include:

設備生命週期五個階段的主要發現包括:

  1. Supplier Selection – In addition, 34% say a PC, laptop or printer supplier has failed a cybersecurity audit in the last five years, with 18% saying the failure was so serious that they terminated their contract. 60% of ITSDMs say the lack of IT and security involvement in device procurement puts the organization at risk.
  2. Onboarding and Configuration – More than half (53%) of ITSDMs say BIOS passwords are shared, used too broadly, or are not strong enough. Moreover, 53% admit they rarely change BIOS passwords over the lifetime of a device.
  3. Ongoing Management – Over 60% of ITSDMs do not make firmware updates as soon as they're available for laptops or printers. A further 57% of ITSDMs say they get FOMU (Fear Of Making Updates) in relation to firmware. Yet 80% believe the rise of AI means attackers will develop exploits faster, making it vital to update quickly.
  4. Monitoring and Remediation – Every year, lost and stolen devices cost organizations an estimated $8.6bni. One in five WFA employees have lost a PC or had one stolen, taking an average 25 hours before notifying IT.
  5. Second Life and Decommissioning – Nearly half (47%) of ITSDMs say data security concerns are a major obstacle when it comes to reusing, reselling, or recycling PCs or laptops, while 39% say it's a major obstacle for printers.
  1. 供應商選擇——此外,34%的人表示在過去五年中,一家PC、筆記本電腦或打印機供應商在網絡安全審計中失敗,18%的人表示失敗嚴重到終止了合同。60%的ITSDMs表示,IT和安全參與設備採購的缺乏使組織面臨風險。
  2. 入職培訓和配置 – 超過一半(53%)的ITSDMs表示BIOS密碼被共享、使用過於廣泛或不夠強大。此外,53%的人承認他們在設備的生命週期內很少更改BIOS密碼。
  3. 持續管理 – 超過60%的ITSDMs不在筆記本電腦或打印機更新固件後立即進行更新。進一步的57%的ITSDMs表示他們在固件更新方面存在恐懼感(FOMU)。儘管如此,80%的人認爲人工智能的興起意味着攻擊者將更快地開發漏洞,因此及時更新至關重要。
  4. 監控與修復 – 每年,丟失和被盜設備使組織損失的估計爲86億美元。五分之一的WFA員工丟失了一臺電腦或被盜,平均需花費25小時才通知IT。
  5. 第二次使用和退役 – 幾乎一半(47%)的ITSDMs表示,數據安全問題是重新使用、轉售或回收PC或筆記本電腦時的主要障礙,而39%的人表示這對打印機也是一個主要障礙。

"Buying PCs, laptops or printers is a security decision with long-term impact on an organization's endpoint infrastructure. The prioritization, or lack thereof, of hardware and firmware security requirements during procurement can have ramifications across the entire lifetime of a fleet of devices – from increased risk exposure, to driving up costs or negative user experience – if security and manageability requirements are set too low compared to the available state of the art," warns Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.

" 購買PC、筆記本電腦或打印機是一個對組織的終端基礎設施產生長期影響的安全決策。在採購過程中,對硬件和固件安全要求的優先級(或缺乏這種優先級)可能會影響整個設備生命週期——從增加風險暴露到推高成本或影響用戶體驗——如果安全和可管理性要求相比於現有技術狀態設定得過低。"惠普安全研究與創新首席技術專家Boris Balacheff警告道。

Balacheff continues: "It's essential that end-user device infrastructures become resilient to cyber risks. This starts with prioritizing the security of hardware and firmware and improving the maturity of how they are managed across the entire lifecycle of devices across the fleet."

"Balacheff繼續表示:"終端用戶設備基礎設施必須能夠抵禦網絡風險。這需要從優先考慮硬件和固件的安全性開始,並提高設備生命週期管理的成熟度。"

From factory to fingertips – oversights in the supplier selection process, and onboarding and configuration limitations, impact device security across the lifecycle

從工廠到指尖 – 供應商選擇過程中的疏漏,以及上線和配置的限制,影響着設備在整個生命週期中的安防-半導體。

The findings highlight the growing need for IT and security to be part of the procurement process for new devices, to set the requirements and verify vendor security claims:

調查結果強調了IT和安防-半導體必須成爲新設備採購過程的一部分,以設置要求並驗證供應商的安防-半導體聲明的日益需要:

  • 52% of ITSDMs say procurement teams rarely collaborate with IT and security to verify suppliers' hardware and firmware security claims.
  • 45% of ITSDMs admit they have to trust suppliers are telling the truth as they don't have the means to validate hardware and firmware security claims in RFPs.
  • 48% of ITSDM even say that procurement teams are like "lambs to the slaughter" as they'll believe anything vendors say.
  • 52%的ITSDM表示,採購團隊很少與IT和安防-半導體合作來驗證供應商的硬件和固件安防-半導體聲明。
  • 45%的ITSDM承認,他們不得不信任供應商所說的是真話,因爲他們沒有方法在RFP中驗證硬件和固件的安防-半導體聲明。
  • 48%的ITSDM甚至表示,採購團隊就像"待宰的羔羊",因爲他們會相信供應商所說的任何事情。

IT professionals are also concerned about the limitations of their ability to onboard and configure devices down to the hardware and firmware level seamlessly.

IT專業人士也對其能夠無縫上線和配置設備到硬件和固件級別的能力限制表示擔憂。

  • 78% of ITSDMs want zero-touch onboarding via the cloud to include hardware and firmware security configuration to improve security.
  • 57% of ITSDMs feel frustrated at not being able to onboard and configure devices via the cloud.
  • Almost half (48%) of WFA workers who had a device delivered to their home complained that the onboarding and configuration process was disruptive.
  • 78%的ITSDM希望通過雲端實現零接觸入職,幷包括硬件和固件的安全配置,以提高安防-半導體。
  • 57%的ITSDM對無法通過雲端入職和配置設備感到沮喪。
  • 幾乎一半(48%)在家收到設備的WFA員工抱怨入職和配置過程令人不安。

"You will always need to choose technology providers you can trust. But when it comes to the security of devices that serve as entry points into your IT infrastructure, this should not be blind trust," comments Michael Heywood, Business Information Security Officer, Supply Chain Cybersecurity at HP Inc. "Organizations need hard evidence – technical briefings, detailed documentation, regular audits and a rigorous validation process to ensure security demands are being met, and devices can be securely and efficiently onboarded."

"您始終需要選擇您可以信任的科技供應商。但是,當涉及到作爲您IT基礎設施入口的設備的安全性時,這不應是盲目的信任," 惠普供應鏈網絡安全部的業務信息安全官Michael Heywood評論道。"組織需要有確鑿的證據——技術簡報、詳細文檔、定期審計和嚴格的驗證過程,以確保安全需求得到滿足,並且設備能夠安全高效地入職。"

Challenges and frustrations around the ongoing management, monitoring and remediation of devices

在設備的持續管理、監控和修復方面的挑戰和挫折

71% of ITSDMs say the rise in work-from-anywhere models has made managing platform security more difficult, impacting worker productivity and creating risky behaviors:

71%的ITSDM表示,遠程工作模式的興起使得管理平台安全變得更加困難,影響了員工的生產力,並導致了一些風險行爲:

  • One in four employees would rather put up with a poor-performing laptop than ask IT to fix or replace it because they can't afford the downtime.
  • 49% of employees have sent their laptop to be repaired, and say this took over 2.5 days to fix or replace the device, forcing many to use their personal laptop for work, or to borrow one from family or friends – blurring the lines between personal and professional use.
  • 12% had an unauthorized third-party provider repair a work device, potentially compromising platform security and clouding IT's view of device integrity.
  • 四分之一的員工寧願忍受性能差的筆記本電腦,也不願要求IT部門修復或更換,因爲他們承擔不起停機時間。
  • 49%的員工表示已將筆記本電腦送去維修,並說這花費了超過2.5天的時間來修復或更換設備,迫使許多人使用個人筆記本電腦工作,或向家人或朋友借用一臺 —— 使個人使用與職業使用的界限模糊。
  • 12%的人讓未經授權的第三方服務提供商修理工作設備,這可能會危及平台安全,模糊IT對設備完整性的認知。

Monitoring and remediating hardware and firmware threats to prevent threat actors accessing sensitive data and critical systems is vital. However, 79% of ITSDMs say their understanding of hardware and firmware security lags behind their knowledge of software security. Moreover, they lack mature tools that would give them the visibility and control they would want to manage hardware and firmware security across their fleets:

監控和修復硬件和固件威脅,以防止威脅行爲者訪問敏感數據和關鍵系統是至關重要的。然而,79%的ITSDM表示,他們對硬件和固件安全的理解落後於對軟件安全的知識。此外,他們缺乏成熟的工具,無法提供他們想要的可見性和控制,以管理整個設備群體的硬件和固件安全:

  • 63% of ITSDMs say they face multiple blind spots around device hardware and firmware vulnerabilities and misconfigurations.
  • 57% cannot analyze the impact of past security events on hardware and firmware to assess devices at risk.
  • 60% say that detection and mitigation of hardware or firmware attacks is impossible, viewing post-breach remediation as the only path.
  • 63%的ITSDM表示,他們在設備硬件和固件漏洞以及錯誤配置方面面臨多個盲點。
  • 57%無法分析過去安防-半導體事件對硬件和固件的影響,從而評估設備的風險。
  • 60%的人表示檢測和緩解硬件或固件攻擊是不可能的,認爲發帖後補救是唯一的出路。

"Post-breach remediation is a losing strategy when it comes to hardware and firmware attacks," warns Alex Holland, Principal Threat Researcher in the HP Security Lab. "These attacks can grant adversaries full control over devices, embedding deep within systems. Traditional security tools are blind to these threats as they tend to focus on the OS and software layers, making detection nearly impossible. Preventing or containing these attacks in the first place is critical to stay ahead, or else organizations risk a threat they cannot see – and cannot remove."

"發帖後補救在硬件和固件攻擊方面是一種失敗的策略," 惠普安全實驗室的首席威脅研究員亞歷克斯·霍蘭警告道。"這些攻擊可以讓對手完全控制設備,深深嵌入系統。傳統的安防-半導體工具對這些威脅視而不見,因爲它們通常集中在操作系統和軟件層,幾乎無法進行檢測。預防或遏制這些攻擊是保持領先的關鍵,否則組織冒着看不見且無法消除的威脅的風險。"

Second life and decommissioning – how data security concerns are leading to an e-waste epidemic

第二次生命和退役 – 數據安全問題如何導致電子廢物的流行

Platform security concerns are also impeding organizations' ability to reuse, recycle or resell end of life devices:

平台安全問題還阻礙了組織重複使用、回收或轉售報廢設備的能力:

  • 59% of ITSDMs say it's too hard to give devices a second life and so they often destroy devices over data security concerns.
  • 69% say they are sitting on a significant number of devices that could be repurposed or donated if they could sanitize them.
  • 60% of ITSDMs admit their failure to recycle and reuse perfectly usable laptops is leading to an e-waste epidemic.
  • 59%的ITSDMs表示,給設備第二次生命太難,因此他們經常出於數據安全考慮而銷燬設備。
  • 69%的人表示他們擁有大量可以重新利用或捐贈的設備,如果能夠消毒這些設備。
  • 60%的ITSDMs承認,他們未能回收和重複使用完全可用的筆記本電腦導致了電子廢物的泛濫。

Complicating matters further, many employees sit on old work devices. This not only prevents devices from being repurposed, but it also creates data security risks around orphaned devices that still may carry corporate data.

情況進一步複雜化,許多員工還保留着舊的工作設備。這不僅阻止了設備的重新利用,還造成了孤立設備的數據安全風險,這些設備可能仍然攜帶企業數據。

  • 70% of WFA employees have at least 1 old work PC/laptop at home or in their office workspace.
  • 12% of WFA workers have left a job without returning their device right away – and almost half of these say they never did.
  • 70%的WFA員工在家或辦公室工作區至少有1台舊的工作PC/筆記本電腦。
  • 12%的WFA員工在離職時未能立即歸還他們的設備——而這些人的近一半表示他們從未歸還過。

"IT teams are hoarding end-of-life devices because they lack the assurance that all sensitive company or personal data has been fully wiped - which in itself can pose data security risks and negatively impact ESG goals. Finding a reputable IT asset disposition vendor that uses the latest industry-standard erasure or media-destruction processes and provides a data sanitization certificate so you can meet compliance requirements, is key," comments Grant Hoffman, SVP Operations and Portfolio, HP Solutions.

「IT團隊在囤積報廢設備,因爲他們沒有保障所有敏感公司或個人數據已被徹底擦除——這本身可能造成數據安全風險,負面影響ESG目標。找到一家聲譽良好的IT資產處置供應商,他們使用最新的行業標準擦除或介質銷燬流程,並提供數據消毒證書,以便滿足合規要求,是關鍵,」惠普解決方案的運營和投資組合高級副總裁Grant Hoffman評論道。

A new approach to the device lifecycle is needed to improve platform security

需要一種新的設備生命週期管理方法,以提高平台的安全性。

More than two thirds (69%) of organizations say their approach to managing device hardware and firmware security only addresses a small part of their lifecycle. This leaves devices exposed, and teams unable to monitor and control platform security from supplier selection to decommissioning.

超過三分之二(69%)的組織表示,他們管理設備硬件和固件安全的方法只涉及其生命週期的一小部分。這使得設備暴露在風險中,團隊無法從供應商選擇到退役監控和控制平台安全。

To manage platform security across the entire lifecycle, HP Wolf Security's recommendations include:

爲了在整個生命週期中管理平台安全,惠普Wolf安全的建議包括:

  • Supplier selection: Ensure IT, security and procurement teams work together to establish security and resilience requirements for new devices, validate vendor security claims and audit supplier manufacturing security governance.
  • Onboarding and configuration: Investigate solutions that enable secure zero-touch onboarding of devices and users, and secure management of firmware settings that don't rely on weak authentication like BIOS passwords.
  • Ongoing management: Identify the tools that will help IT monitor and update device configuration remotely and deploy firmware updates quickly to reduce your fleet's attack surface.
  • Monitoring and Remediation: Ensure IT and security teams can find, lock and erase data from devices remotely – even those that are powered down – to reduce the risk of lost and stolen devices. Improve resilience by monitoring device audit logs to identify platform security risks, such as detecting unauthorized hardware and firmware changes and signs of exploitation.
  • Second life and decommissioning: Prioritize devices that can securely erase sensitive hardware and firmware data to enable safe decommissioning. Before redeploying devices, seek to audit their lifetime service history to verify chain of custody, and hardware and firmware integrity.
  • 供應商選擇:確保IT、安全和採購團隊共同合作,建立新設備的安全性和韌性要求,驗證供應商的安全聲明,並審核供應商的製造安全治理。
  • 入職和配置:調查能實現安全零接觸入職設備和用戶的解決方案,以及能安全管理不依賴於弱身份驗證(如BIOS密碼)的固件設置。
  • 持續管理:識別能夠幫助IT遠程監控和更新設備配置,以及快速部署固件更新以減少設備攻擊面所需的工具。
  • 監控和修復:確保IT和安全團隊能夠遠程查找、鎖定和擦除設備數據——即使是關閉狀態的設備——以降低丟失和被盜設備的風險。通過監控設備審計日誌來識別平台安全風險,如檢測未經授權的硬件和固件更改以及被利用的跡象,以提升抗風險能力。
  • 第二生命和退役:優先考慮能夠安全擦除敏感硬件和固件數據的設備,以實現安全退役。在重新部署設備之前,尋求審核其生命週期服務歷史,以驗證交接鏈、硬件和固件的完整性。

For further insights and recommendations download the full report 'Securing the Device Lifecycle: From Factory to Fingertips, and Future Redeployment' here.

獲取更多見解和建議,請在此下載完整報告《安全設備生命週期:從工廠到指尖,以及未來的重新部署》。

About the data

關於數據

  1. WFA sample: A survey of 6,055 office workers that work hybrid, remotely or from anywhere in the US, Canada, UK, Japan, Germany and France. Fieldwork was undertaken from 22nd – 30th May 2024. The survey was carried out online by Censuswide.
  2. ITSDM sample: A survey of 803 IT and security decision makers in the US, Canada, UK, Japan, Germany and France. Fieldwork was undertaken from 22nd February – 5th March 2024. The survey was carried out online by Censuswide.
  1. WFA樣本:對6055名在美國、加拿大、英國、日本、德國和法國從事混合、遠程或任何地方工作的辦公室員工的調查。實地調查於2024年5月22日至30日進行。調查由Censuswide在線進行。
  2. ITSDm樣本:對美國、加拿大、英國、日本、德國和法國的803名IT和安全決策者的調查。實地調查於2024年2月22日至3月5日進行。調查由Censuswide在線進行。

About HP

關於惠普

HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: .

惠普(紐交所:HPQ)是全球科技領導者,創造出使人們能夠實現想法並連接到最重要事物的解決方案。惠普在170多個國家運營,提供廣泛的創新和可持續的設備、服務和個人計算、打印、3D打印、混合工作、ARVR遊戲等的訂閱。欲了解更多信息,請訪問:.

About HP Wolf Security

關於惠普Wolf安防

HP Wolf Security is world class endpoint security. HP's portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit .

惠普Wolf安全是世界級的終端安全。惠普的硬件強化安全和以終端爲中心的安全服務組合旨在幫助組織保護電腦、打印機和人員免受網絡捕食者的威脅。惠普Wolf安全提供全面的終端保護和彈性,從硬件層面開始,延伸到軟件和服務。請訪問。

i The global lost/stolen laptop epidemic figure was reached by taking the average number of laptops reported lost/stolen in the last year (103) by ITSDMs and the average cost of each lost/stolen laptop ($2,272). This comes to $234,119. The cost is then extrapolated across the number of large organizations (with 1,000+ employees) in the same territories as the research scope:

全球丟失/被盜筆記本電腦的疫情數據是通過計算去年(103)ITSDM報告的平均丟失/被盜筆記本電腦數量和每台丟失/被盜筆記本電腦的平均成本($2,272)得出的。總計爲$234,119。然後將此成本推算到在研究範圍內的相同地區的大型組織(員工超過1000人)數量上:

  • United States – 17,834 large organizations (US Bureau of Labor Statistics)
  • Canada – 2,868 large organizations (Government of Canada)
  • UK – 3,900 (UK Government)
  • Japan – 6,557 (eStat – Japanese Government Statistics)
  • Germany – 4,304 (OECD)
  • France – 1,460 (OECD)
  • 美國 – 17,834 家大型組織(美國勞工統計局)
  • 加拿大 – 2,868 家大型組織(加拿大政府)
  • 英國 – 3,900(英國政府)
  • 日本 – 6,557(eStat – 日本政府統計)
  • 德國 – 4,304 (經濟合作與發展組織)
  • 法國 – 1,460 (經濟合作與發展組織)

In total, there are 36,923 large organizations. If each lost 103 laptops at an average cost of $2,273 ($234,119) then the global cost of lost/stolen laptops is $8,644,375,837.

總共有36,923家大型組織。如果每家組織損失103檯筆記本電腦,平均成本爲2,273美元(234,119美元),那麼丟失/被盜筆記本電腦的全球成本爲8,644,375,837美元。

Media Contacts
HP Media Relations
MediaRelations@hp.com
hp.com/go/newsroom

媒體聯繫人
惠普媒體關係
MediaRelations@hp.com
hp.com/go/newsroom


譯文內容由第三人軟體翻譯。


以上內容僅用作資訊或教育之目的,不構成與富途相關的任何投資建議。富途竭力但無法保證上述全部內容的真實性、準確性和原創性。
    搶先評論