Monday, June 23, 2025
  • About Web3Wire
  • Web3Wire NFTs
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Media Network
  • RSS Feed
  • Contact Us
Web3Wire
No Result
View All Result
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
No Result
View All Result
Web3Wire
No Result
View All Result
Home Artificial Intelligence

HP Wolf Security Study Reveals Platform Security Gaps That Threaten Organizations at Every Stage of the Device Lifecycle

December 12, 2024
in Artificial Intelligence, GlobeNewswire, Web3
Reading Time: 12 mins read
5
SHARES
243
VIEWS
Share on TwitterShare on LinkedInShare on Facebook

PALO ALTO, Calif., Dec. 12, 2024 (GLOBE NEWSWIRE) — HP Inc. (NYSE: HPQ) today released a new report highlighting the far-reaching cybersecurity implications of failing to secure devices at every stage of their lifecycle. The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come.

The report, based on a global study of 800+ IT and security decision-makers (ITSDMs) and 6000+ work-from-anywhere (WFA) employees, shows that platform security is a growing concern with 81% of ITSDMs agreeing that hardware and firmware security must become a priority to ensure attackers cannot exploit vulnerable devices. However, 68% report that investment in hardware and firmware security is often overlooked in the total cost of ownership (TCO) for devices. This is leading to costly security headaches, management overheads and inefficiencies further down the line.

Key findings from across the five stages of the device lifecycle include:

  1. Supplier Selection – In addition, 34% say a PC, laptop or printer supplier has failed a cybersecurity audit in the last five years, with 18% saying the failure was so serious that they terminated their contract. 60% of ITSDMs say the lack of IT and security involvement in device procurement puts the organization at risk.
  2. Onboarding and Configuration – More than half (53%) of ITSDMs say BIOS passwords are shared, used too broadly, or are not strong enough. Moreover, 53% admit they rarely change BIOS passwords over the lifetime of a device.
  3. Ongoing Management – Over 60% of ITSDMs do not make firmware updates as soon as they’re available for laptops or printers. A further 57% of ITSDMs say they get FOMU (Fear Of Making Updates) in relation to firmware. Yet 80% believe the rise of AI means attackers will develop exploits faster, making it vital to update quickly.
  4. Monitoring and Remediation – Every year, lost and stolen devices cost organizations an estimated $8.6bni. One in five WFA employees have lost a PC or had one stolen, taking an average 25 hours before notifying IT.
  5. Second Life and Decommissioning – Nearly half (47%) of ITSDMs say data security concerns are a major obstacle when it comes to reusing, reselling, or recycling PCs or laptops, while 39% say it’s a major obstacle for printers.

“Buying PCs, laptops or printers is a security decision with long-term impact on an organization’s endpoint infrastructure. The prioritization, or lack thereof, of hardware and firmware security requirements during procurement can have ramifications across the entire lifetime of a fleet of devices – from increased risk exposure, to driving up costs or negative user experience – if security and manageability requirements are set too low compared to the available state of the art,” warns Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.

Balacheff continues: “It’s essential that end-user device infrastructures become resilient to cyber risks. This starts with prioritizing the security of hardware and firmware and improving the maturity of how they are managed across the entire lifecycle of devices across the fleet.”

From factory to fingertips – oversights in the supplier selection process, and onboarding and configuration limitations, impact device security across the lifecycle

The findings highlight the growing need for IT and security to be part of the procurement process for new devices, to set the requirements and verify vendor security claims:

  • 52% of ITSDMs say procurement teams rarely collaborate with IT and security to verify suppliers’ hardware and firmware security claims.
  • 45% of ITSDMs admit they have to trust suppliers are telling the truth as they don’t have the means to validate hardware and firmware security claims in RFPs.
  • 48% of ITSDM even say that procurement teams are like “lambs to the slaughter” as they’ll believe anything vendors say.

IT professionals are also concerned about the limitations of their ability to onboard and configure devices down to the hardware and firmware level seamlessly.

  • 78% of ITSDMs want zero-touch onboarding via the cloud to include hardware and firmware security configuration to improve security.
  • 57% of ITSDMs feel frustrated at not being able to onboard and configure devices via the cloud.
  • Almost half (48%) of WFA workers who had a device delivered to their home complained that the onboarding and configuration process was disruptive.

“You will always need to choose technology providers you can trust. But when it comes to the security of devices that serve as entry points into your IT infrastructure, this should not be blind trust,” comments Michael Heywood, Business Information Security Officer, Supply Chain Cybersecurity at HP Inc. “Organizations need hard evidence – technical briefings, detailed documentation, regular audits and a rigorous validation process to ensure security demands are being met, and devices can be securely and efficiently onboarded.”

Challenges and frustrations around the ongoing management, monitoring and remediation of devices

71% of ITSDMs say the rise in work-from-anywhere models has made managing platform security more difficult, impacting worker productivity and creating risky behaviors:

  • One in four employees would rather put up with a poor-performing laptop than ask IT to fix or replace it because they can’t afford the downtime.
  • 49% of employees have sent their laptop to be repaired, and say this took over 2.5 days to fix or replace the device, forcing many to use their personal laptop for work, or to borrow one from family or friends – blurring the lines between personal and professional use.
  • 12% had an unauthorized third-party provider repair a work device, potentially compromising platform security and clouding IT’s view of device integrity.

Monitoring and remediating hardware and firmware threats to prevent threat actors accessing sensitive data and critical systems is vital. However, 79% of ITSDMs say their understanding of hardware and firmware security lags behind their knowledge of software security. Moreover, they lack mature tools that would give them the visibility and control they would want to manage hardware and firmware security across their fleets:

  • 63% of ITSDMs say they face multiple blind spots around device hardware and firmware vulnerabilities and misconfigurations.
  • 57% cannot analyze the impact of past security events on hardware and firmware to assess devices at risk.
  • 60% say that detection and mitigation of hardware or firmware attacks is impossible, viewing post-breach remediation as the only path.

“Post-breach remediation is a losing strategy when it comes to hardware and firmware attacks,” warns Alex Holland, Principal Threat Researcher in the HP Security Lab. “These attacks can grant adversaries full control over devices, embedding deep within systems. Traditional security tools are blind to these threats as they tend to focus on the OS and software layers, making detection nearly impossible. Preventing or containing these attacks in the first place is critical to stay ahead, or else organizations risk a threat they cannot see – and cannot remove.”

Second life and decommissioning – how data security concerns are leading to an e-waste epidemic

Platform security concerns are also impeding organizations’ ability to reuse, recycle or resell end of life devices:

  • 59% of ITSDMs say it’s too hard to give devices a second life and so they often destroy devices over data security concerns.
  • 69% say they are sitting on a significant number of devices that could be repurposed or donated if they could sanitize them.
  • 60% of ITSDMs admit their failure to recycle and reuse perfectly usable laptops is leading to an e-waste epidemic.

Complicating matters further, many employees sit on old work devices. This not only prevents devices from being repurposed, but it also creates data security risks around orphaned devices that still may carry corporate data.

  • 70% of WFA employees have at least 1 old work PC/laptop at home or in their office workspace.
  • 12% of WFA workers have left a job without returning their device right away – and almost half of these say they never did.

“IT teams are hoarding end-of-life devices because they lack the assurance that all sensitive company or personal data has been fully wiped – which in itself can pose data security risks and negatively impact ESG goals. Finding a reputable IT asset disposition vendor that uses the latest industry-standard erasure or media-destruction processes and provides a data sanitization certificate so you can meet compliance requirements, is key,” comments Grant Hoffman, SVP Operations and Portfolio, HP Solutions.

A new approach to the device lifecycle is needed to improve platform security

More than two thirds (69%) of organizations say their approach to managing device hardware and firmware security only addresses a small part of their lifecycle. This leaves devices exposed, and teams unable to monitor and control platform security from supplier selection to decommissioning.

To manage platform security across the entire lifecycle, HP Wolf Security’s recommendations include:

  • Supplier selection: Ensure IT, security and procurement teams work together to establish security and resilience requirements for new devices, validate vendor security claims and audit supplier manufacturing security governance.
  • Onboarding and configuration: Investigate solutions that enable secure zero-touch onboarding of devices and users, and secure management of firmware settings that don’t rely on weak authentication like BIOS passwords.
  • Ongoing management: Identify the tools that will help IT monitor and update device configuration remotely and deploy firmware updates quickly to reduce your fleet’s attack surface.
  • Monitoring and Remediation: Ensure IT and security teams can find, lock and erase data from devices remotely – even those that are powered down – to reduce the risk of lost and stolen devices. Improve resilience by monitoring device audit logs to identify platform security risks, such as detecting unauthorized hardware and firmware changes and signs of exploitation.
  • Second life and decommissioning: Prioritize devices that can securely erase sensitive hardware and firmware data to enable safe decommissioning. Before redeploying devices, seek to audit their lifetime service history to verify chain of custody, and hardware and firmware integrity.

For further insights and recommendations download the full report ‘Securing the Device Lifecycle: From Factory to Fingertips, and Future Redeployment’ here.

About the data

  1. WFA sample: A survey of 6,055 office workers that work hybrid, remotely or from anywhere in the US, Canada, UK, Japan, Germany and France. Fieldwork was undertaken from 22nd – 30th May 2024. The survey was carried out online by Censuswide.
  2. ITSDM sample: A survey of 803 IT and security decision makers in the US, Canada, UK, Japan, Germany and France. Fieldwork was undertaken from 22nd February – 5th March 2024. The survey was carried out online by Censuswide.

About HP

HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: http://www.hp.com.

About HP Wolf Security

HP Wolf Security is world class endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit https://hp.com/wolf.

i The global lost/stolen laptop epidemic figure was reached by taking the average number of laptops reported lost/stolen in the last year (103) by ITSDMs and the average cost of each lost/stolen laptop ($2,272). This comes to $234,119. The cost is then extrapolated across the number of large organizations (with 1,000+ employees) in the same territories as the research scope:

In total, there are 36,923 large organizations. If each lost 103 laptops at an average cost of $2,273 ($234,119) then the global cost of lost/stolen laptops is $8,644,375,837.

Media Contacts
HP Media Relations
MediaRelations@hp.com
hp.com/go/newsroom

About Web3Wire
Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming.
Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.
ShareTweet1ShareSendShare2
Previous Post

Nokia and Motorola Solutions announce drone technology integration for public safety and mission-critical industries

Next Post

Morpheus Makes $20 Million MOR Rewards Available for Compute Providers

Related Posts

“The Most Important Thing About Art is Freedom,” says AR Rahman at IGF London 2025

Oscar-winning composer on scent cinema, AI, and the reinvention of Indian music culture LONDON, June 22, 2025 /PRNewswire/ --  In a deeply personal and expansive conversation at the final day of India Global Forum London 2025 at Taj St. James' Court, Academy Award-winning composer AR Rahman urged artists, institutions, and...

Read moreDetails

ZiiGaat Launches Luna: 6-BA Driver Studio IEM for True Audio Professionals

Featuring Sonion and Knowles Drivers, Luna Delivers Studio Precision and Tonal Neutrality. NEW YORK CITY, NY / ACCESS Newswire / June 22, 2025 / As a handcrafted IEM, Luna is designed for studio engineers and stage performers seeking uncompromising accuracy and tonal neutrality. Each Luna unit features six balanced armature...

Read moreDetails

XRP is struggling to break through the $3 mark, and PBK Miner launches innovative XRP cloud mining contracts, attracting widespread attention

New York City, June 22, 2025 (GLOBE NEWSWIRE) -- XRP has been trading in a tight range between $2.05 and $2.33 over the past 30 days, with the $3.00 resistance level struggling to break through. This period of price consolidation coincided with the launch of PBK Miner’s innovative XRP cloud...

Read moreDetails

RICH Miner Announces Global Expansion and Zero-Hassle Cloud Mining for Robinhood Users

London, UK, June 22, 2025 (GLOBE NEWSWIRE) -- RICH Miner, an intelligent cloud mining platform, has officially announced its global expansion and enhanced features, making it easier than ever for Robinhood users and crypto investors worldwide to earn daily passive income through clean-energy cloud mining. With the increasing demand for...

Read moreDetails

Bitcoin Cash Nears $500, Cardano Eyes $0.70, & Web3 ai Rises with $8.3 M Raised & 1,747% ROI Potential

As the crypto market gains momentum in 2025, three standout projects are capturing attention for their bullish crypto setups. Bitcoin Cash (BCH) price performance is gaining strength, trading near $473 after a nearly 10% rise and supported by a surge in Open Interest from $312 million to $485 million, along...

Read moreDetails

XRP News: Vaultro Finance Presale on XRP Is Set to End in 7 Days, Already Sold Out 72% of Its Allocation — Join $VLT Presale Now

SINGAPORE, June 21, 2025 (GLOBE NEWSWIRE) -- Vaultro Finance has smashed through another milestone, announcing today that its $VLT token presale has sold over 70% of its total allocation, with just seven days left before the sale ends. In under a week, commitments have soared from 62% to 72%, underscoring...

Read moreDetails

Flatbed Trucking Market Is Going to Boom | Estes Express,Ryder,Maersk

Flatbed Trucking Market HTF MI just released the just released the Global Flatbed Trucking Market Study, a comprehensive analysis of the market that spans more than 143+ pages and describes the product and industry scope as well as the market prognosis and status for 2025-2032. The marketization process is being...

Read moreDetails

Carbon Fiber Bicycle Frame Market Hits New High |Trek,Colnago,Cervélo

Carbon Fiber Bicycle Frame Market HTF MI just released the Global Carbon Fiber Bicycle Frame Market Study, a comprehensive analysis of the market that spans more than 143+ pages and describes the product and industry scope as well as the market prognosis and status for 2025-2032. The marketization process is...

Read moreDetails

IoT Healthcare Market to Show Strong Growth | Leading players- Medtronic, IBM Watson Health, Philips Healthcare

IoT Healthcare Market HTF MI recently introduced Global IoT Healthcare Market study with 143+ pages in-depth overview, describing about the Product / Industry Scope and elaborates market size (2025-2032). The market Study is segmented by key regions which is accelerating the marketization. At present, the market is developing its presence.Major...

Read moreDetails

DRML Miner Launches Zero-Cost Cloud Mining Platform, Empowering Users Worldwide to Mine Crypto with Ease and Sustainability

London, UK, June 21, 2025 (GLOBE NEWSWIRE) --  DRML Miner, a UK-based cloud mining provider, today announced the official launch of its innovative zero-cost cloud mining platform, designed to make cryptocurrency mining accessible, sustainable, and profitable for users across the globe. With the cryptocurrency market experiencing renewed interest and mining...

Read moreDetails
Web3Wire NFTs - The Web3 Collective

Web3Wire, $W3W Token and .w3w tld Whitepaper

Web3Wire, $W3W Token and .w3w tld Whitepaper

Claim your space in Web3 with .w3w Domain!

Web3Wire

Trending on Web3Wire

  • Unifying Blockchain Ecosystems: 2024 Guide to Cross-Chain Interoperability

    65 shares
    Share 26 Tweet 16
  • Top Cross-Chain DeFi Solutions to Watch by 2025

    35 shares
    Share 14 Tweet 9
  • Discover 2025’s Top 5 Promising Low-Cap Crypto Gems

    55 shares
    Share 22 Tweet 14
  • ReggaeEDM Takes The Stage

    7 shares
    Share 3 Tweet 2
  • Top 5 Wallets for Seamless Multi-Chain Trading in 2025

    35 shares
    Share 14 Tweet 9
Join our Web3Wire Community!

Our newsletters are only twice a month, reaching around 10000+ Blockchain Companies, 800 Web3 VCs, 600 Blockchain Journalists and Media Houses.


* We wont pass your details on to anyone else and we hate spam as much as you do. By clicking the signup button you agree to our Terms of Use and Privacy Policy.

Web3Wire Podcasts

Upcoming Events

Web 3.0 and AI Summit 2025

2025-09-11
Frankfurt
Summit

Latest on Web3Wire

  • “The Most Important Thing About Art is Freedom,” says AR Rahman at IGF London 2025
  • ZiiGaat Launches Luna: 6-BA Driver Studio IEM for True Audio Professionals
  • XRP is struggling to break through the $3 mark, and PBK Miner launches innovative XRP cloud mining contracts, attracting widespread attention
  • RICH Miner Announces Global Expansion and Zero-Hassle Cloud Mining for Robinhood Users
  • A Call for Scientific Transparency and Accountability

RSS Latest on Block3Wire

  • Covo Finance: Revolutionary Crypto Leverage Trading Platform
  • WorldStrides and HEX Announce Partnership to Offer High School and University Students Innovative Courses Designed to Improve Their Outlook in the Digital Age
  • Cathedra Bitcoin Announces Leasing of 2.5-MW Bitcoin Mining Facility
  • Global Web3 Payments Leader, Banxa, Announces Integration With Metis to Usher In Next Wave of Cryptocurrency Users
  • Dexalot Launches First Hybrid DeFi Subnet on Avalanche

RSS Latest on Meta3Wire

  • Thumbtack Honored as a 2023 Transform Awards Winner
  • Accenture Invests in Looking Glass to Accelerate Shift from 2D to 3D
  • MetatronAI.com Unveils Revolutionary AI-Chat Features and Interface Upgrades
  • Purely.website – Disruptive new platform combats rising web hosting costs
  • WEMADE and Metagravity Sign Strategic Alliance MOU to Collaborate on Blockchain Games for the Metaverse
Web3Wire

Web3Wire is your go-to source for the latest insights and updates in Web3, Metaverse, Blockchain, AI, Cryptocurrencies, DeFi, NFTs, and Gaming. We provide comprehensive coverage through news, press releases, event updates, and research articles, keeping you informed about the rapidly evolving digital world.

  • About Web3Wire
  • Web3Wire NFTs – The Web3 Collective
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Event Partners
  • Community Partners
  • Our Media Network
  • Media Kit
  • RSS Feeds
  • Contact Us

Whitepaper | Tokenomics

Crypto Coins

  • Top 10 Coins
  • Top 50 Coins
  • Top 100 Coins
  • All Coins – Marketcap
  • Crypto Coins Heatmap

Crypto Exchanges

  • Top 10 Exchanges
  • Top 50 Exchanges
  • Top 100 Exchanges
  • All Crypto Exchanges

Crypto Stocks

  • Blockchain Stocks
  • NFT Stocks
  • Metaverse Stocks
  • Artificial Intelligence Stocks

Media Portfolio: Block3Wire | Meta3Wire

Web3 Resources

  • Top Web3 and Crypto Youtube Channels
  • Latest Crypto News
  • Latest DeFi News
  • Latest Web3 News

Blockchain Resources

  • Blockchain and Web3 Resources
  • Decentralized Finance (DeFi) – Research Reports
  • All Crypto Whitepapers

Metaverse Resources

  • AR VR and Metaverse Resources
  • Metaverse Courses
Claim your space in Web3 with .w3w!
Top 50 Web3 Blogs and Websites
Web3Wire Podcast on Spotify Web3Wire Podcast on Amazon Music 
Web3Wire - Web3 and Blockchain - News, Events and Press Releases | Product Hunt
Web3Wire on Google News
  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • For Search Engines
  • Crypto Sitemap
  • Exchanges Sitemap

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Coins
    • Top 10 Cryptocurrencies
    • Top 50 Cryptocurrencies
    • Top 100 Cryptocurrencies
    • All Coins
  • Exchanges
    • Top 10 Cryptocurrency Exchanges
    • Top 50 Cryptocurrency Exchanges
    • Top 100 Cryptocurrency Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.