Connect with us
https://groinfont.com/uk8cmfiy8?key=89fae749c33a20b14194e629d21b71fe

News

HP Wolf Security Study Reveals Alarming Platform Security Gaps In Device Lifecycle

Published

on

HP Inc. (NYSE: HPQ) has released a new report highlighting the far-reaching cybersecurity implications of failing to secure devices at every stage of their lifecycle.

This was made known in a statement released on December 12, 2024.

Advertisement

The findings show that platform security, securing the hardware and firmware of PCs, laptops, and printers, is often overlooked, weakening cybersecurity posture for years to come.

The report, based on a global study of 800+ IT and security decision-makers, ITSDM, and 6000+ work-from-anywhere employees, shows that platform security is a growing concern, with 81% of IT decision-makers agreeing that hardware and firmware security must become a priority to ensure attackers cannot exploit vulnerable devices.

However, 68% report that investment in hardware and firmware security is often overlooked in the total cost of ownership for devices. This is leading to costly security headaches, management overheads, and inefficiencies further down the line.

Advertisement

According to the statement, Key findings from across the five stages of the device lifecycle include:
Supplier Selection: In addition, 34% say a PC, laptop or printer supplier has failed a cybersecurity audit in the last five years, with 18% saying the failure was so serious that they terminated their contract. 60% of ITSDMs say the lack of IT and security involvement in device procurement puts the organization at risk.

Onboarding and Configuration: More than half (53%) of ITSDMs say BIOS passwords are shared, used too broadly, or are not strong enough. Moreover, 53% admit they rarely change BIOS passwords over the lifetime of a device.

Ongoing Management: Over 60% of ITSDMs do not make firmware updates as soon as they’re available for laptops or printers. A further 57% of ITSDMs say they get FOMU (Fear Of Making Updates) in relation to firmware. Yet 80% believe the rise of AI means attackers will develop exploits faster, making it vital to update quickly.

Advertisement

Monitoring and Remediation: Every year, lost and stolen devices cost organizations an estimated $8.6bn. One in five WFA employees have lost a PC or had one stolen, taking an average 25 hours before notifying IT.

Second Life and Decommissioning: Nearly half (47%) of ITSDMs say data security concerns are a major obstacle when it comes to reusing, reselling, or recycling PCs or laptops, while 39% say it’s a major obstacle for printers.

READ ALSO: HP Wolf Security Offers Unique Business PC Protection Against Physical Cyberattacks

Advertisement

“Buying PCs, laptops or printers is a security decision with long-term impact on an organization’s infrastructure. The prioritization, or lack thereof, of hardware and firmware security requirements during procurement can have ramifications across the entire lifetime of a fleet of devices – from increased risk exposure, to driving up costs or negative user experience – if security and manageability requirements are set too low compared to the available state of the art,” warns Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Inc.

Balacheff continues: “It’s essential that end-user device infrastructures become resilient to cyber risks. This starts with prioritizing the security of hardware and firmware and improving the maturity of how they are managed across the entire lifecycle of devices across the fleet.”

The report highlights the growing need for IT and security to be part of the procurement process for new devices, to set the requirements and verify vendor security claims, Oversights in the supplier selection process and onboarding and configuration limitations impact device security across the lifecycle.

Advertisement

52% of ITSDMs say procurement teams rarely collaborate with IT and security to verify suppliers’ hardware and firmware security claims.
45% of ITSDMs admit they have to trust suppliers are telling the truth as they don’t have the means to validate hardware and firmware security claims in RFPs.
48% of ITDMS even say that procurement teams are like “lambs to the slaughter” as they’ll believe anything vendors say.

78% of ITSDMs want zero-touch onboarding via the cloud to include hardware and firmware security configuration to improve security.
57% of ITSDMs feel frustrated at not being able to onboard and configure devices via the cloud.
Almost half (48%) of WFA workers who had a device delivered to their home complained that the onboarding and configuration process was disruptive.

“You will always need to choose technology providers you can trust. But when it comes to the security of devices that serve as entry points into your IT infrastructure, this should not be blind trust,” comments Michael Heywood, Business Information Security Officer, Supply Chain Cybersecurity at HP Inc. “Organizations need hard evidence – technical briefings, detailed documentation, regular audits and a rigorous validation process to ensure security demands are being met, and devices can be securely and efficiently onboarded.”

Advertisement

Challenges and frustrations around the ongoing management, monitoring and remediation of devices, 71% of ITSDMs say the rise in work-from-anywhere models has made managing platform security more difficult, impacting worker productivity and creating risky behaviors:

One in four employees would rather put up with a poor-performing laptop than ask IT to fix or replace it because they can’t afford the downtime.
49% of employees have sent their laptop to be repaired, and say this took over 2.5 days to fix or replace the device, forcing many to use their personal laptop for work or to borrow one from family or friends, blurring the lines between personal and professional use.
12% had an unauthorized third-party provider repair a work device, potentially compromising platform security and clouding IT’s view of device integrity.

Monitoring and remediating hardware and firmware threats to prevent threat actors accessing sensitive data and critical systems is vital. However, 79% of ITSDMs say their understanding of hardware and firmware security lags behind their knowledge of software security. Moreover, they lack mature tools that would give them the visibility and control they would want to manage hardware and firmware security across their fleets:

Advertisement

63% of ITSDMs say they face multiple blind spots around device hardware and firmware vulnerabilities and misconfigurations.
57% cannot analyze the impact of past security events on hardware and firmware to assess devices at risk.
60% say that detection and mitigation of hardware or firmware attacks is impossible, viewing post-breach remediation as the only path.

“Post-breach remediation is a losing strategy when it comes to hardware and firmware attacks,” warns Alex Holland, Principal Threat Researcher in the HP Security Lab. “These attacks can grant adversaries full control over devices, embedding deep within systems. Traditional security tools are blind to these threats as they tend to focus on the OS and software layers, making detection nearly impossible. Preventing or containing these attacks in the first place is critical to stay ahead, or else organizations risk a threat they cannot see and cannot remove.”

Second life and decommissioning: how data security concerns are leading to an e-waste epidemic

Advertisement

Platform security concerns are also impeding organizations’ ability to reuse, recycle or resell end of life devices:

59% of ITSDMs say it’s too hard to give devices a second life and so they often destroy devices over data security concerns.
69% say they are sitting on a significant number of devices that could be repurposed or donated if they could sanitize them.
60% of ITSDMs admit their failure to recycle and reuse perfectly usable laptops is leading to an e-waste epidemic.

Complicating matters further, many employees sit on old work devices. This not only prevents devices from being repurposed, but it also creates data security risks around orphaned devices that still may carry corporate data.

Advertisement

70% of WFA employees have at least 1 old work PC/laptop at home or in their office workspace.
12% of WFA workers have left a job without returning their device right away – and almost half of these say they never did.

More than two thirds (69%) of organizations say their approach to managing device hardware and firmware security only addresses a small part of their lifecycle. This leaves devices exposed, and teams unable to monitor and control platform security from supplier selection to decommissioning.

Addressing these platform security gaps, HP Wolf Security recommends a comprehensive approach to managing device hardware and firmware security across the entire lifecycle. This includes collaborative supplier selection and auditing, secure zero-touch onboarding and configuration, ongoing monitoring and management, effective monitoring and remediation, and secure decommissioning and second-life management.

Advertisement

 

Advertisement

News

BREAKING: Renowned Businessman, Aminu Dantata, Is Dead

Published

on

By

Alhaji Aminu Alhassan Dantata, a renowned Nigerian businessman and philanthropist, has passed away at the age of 94.

The news of billionaire businessman’s demise was disclosed via a social media post on Saturday by the Deputy National Treasurer of the Nigerian Association of Chambers of Commerce, Industry, Mines and Agriculture (NACCIMA), Uba Tanko Mijinyawa.

Advertisement

According to him, details of the Muslim funeral prayer (Jana’iza) for Dantata will be announced in due course.

Inna Lillahi wa’inna ilaihi Raji’un. Allah ya yi wa babanmu Dattijo, Alhaji Aminu Alhassan Dantata, rasuwa. Muna addu’a Allah ya jikan sa, ya gafarta masa. Za a sanar da lokacin jana’izarsa,” Tanko wrote in Hausa language.

READ ALSO: One Dead As Police Foil Kidnap Attempt In Kogi

Advertisement

Tanko’s message about the late philanthropist, who is also an uncle to Africa’s richest man, Aliko Dangote, was translated as “Indeed, we belong to Allah and to Him we shall return. May Allah have mercy on our father and elder, Alhaji Aminu Alhassan Dantata. We pray for his forgiveness. The time of his funeral will be announced.”

Also confirming the news, his Principal Private Secretary, Mustapha Abdullahi Junaid, disclosed in a statement Saturday morning that the Janazah details will be shared later.

Junaid wrote, “Innalillahi wa inna ilaihi rajiun. Innalillahi wa inna ilaihi rajiun. It is with heavy heart that I announce the passing of our beloved father, Alhaji Aminu Alhassan Dantata. May Allah grant him Jannatul Firdaus and forgive his shortcomings. The Janazah details will be shared later insha Allah.”

Advertisement

Alhaji Aminu Dantata, who was the founder of Express Petroleum & Gas Company Ltd., is also credited with having played a key role in the establishment of Nigeria’s first non-interest (Islamic) bank, Jaiz Bank.

 

Advertisement
Continue Reading

News

EYIF: Utilize N2m Grant Provided By The Govt, Edo Deputy Gov Urges Youths

Published

on

By

says 1,500 applicants screened, 30 met requirements

Deputy Governor of Edo State, Hon. Dennis Idahosa, has urged youths in the state to make the best use of the N2 million start-up grant provided by the state government under the Edo Youth Impact Forum (EYIF).

Idahosa added that the youths must be innovative as they tapped into the two million start-up grant.

Advertisement

In a statement, the Chief Press Secretary to the Deputy Governor, Friday Aghedo, said Idahosa made the remarks during an incubation class of EYIF.

The Edo number two citizen, while noting that EYIF was parts of the government’s drive to build a new generation of entrepreneurs that would impact and shape the state’s financial economy, showed them how to position themselves in the entrepreneurial space to boost the local economy.

READ ALSO: Idahosa Optimistic Shaibu Will Perform As National Sports Institute DG

Advertisement

Idahosa encouraged the youths to put behind their challenges and make the best of the opportunity provided by the Senator Monday Okpebholo-led government.

According to him,
though 1,500 applicants got screened ahead of the finale scheduled for July 2, 2025, only 30 met the requirement and thus scaled the initial process.

“This number has again been pruned to 10 participants today and will eventually be reduced further to five finalists at the end of the day.

Advertisement

“Irrespective of who emerges as finalists, I want you to know that you are all winners. We are here as a government to encourage the youths because any society that strives to grow must have an active youth involvement,” Idahosa reiterated.

Earlier, the Special Adviser to the Governor on Finance, Investment and Revenue Generation, Mr. Kizito Okpebholo, presented the participants to the deputy governor.

 

Advertisement

Continue Reading

News

Things To Know About Nigeria’s New Tax Laws

Published

on

By

President Bola Tinubu on Thursday signed four new tax laws aimed at modernising and streamlining the country’s tax system.

In the new tax law, the Value Added Tax rate remains at 7.5 per cent despite initial proposals to increase to 12.5 per cent, but its scope is expanded.

Advertisement

Essential items—such as food, education, healthcare, public transport, residential rent, and exports—are zero-rated to ease inflationary pressure.

For revenue allocation is restructured: now 30 per cent of VAT proceeds are distributed based on consumption (rather than contribution), 50 per cent equally among states, and 20 per cent to population-based allocation.

With the latest development, it is expected that state revenue streams will increase, and it will also discourage tax evasion.

Advertisement

Overview of the four new laws

Nigeria Tax Act: Consolidates various tax rules into a single, simplified code, eliminating over 50 small, overlapping taxes. This reduces complexity and duplication, making it easier for businesses to comply.

READ ALSO:Nigerian Lawmakers Approve Tinubu Tax Reform Bills

Advertisement

Tax Administration Act: Establishes uniform rules for tax collection across federal, state, and local governments, ensuring consistency and reducing administrative conflicts.

Nigeria Revenue Service Act: Replaces the Federal Inland Revenue Service with the independent Nigeria Revenue Service, aiming for greater efficiency and autonomy in tax administration.

Joint Revenue Board Act: Enhances coordination between different government levels and introduces a Tax Ombudsman and Tax Appeal Tribunal to handle disputes fairly.

Advertisement

Key objectives of the new tax rules

Simplify Tax System: Reduces bureaucratic hurdles and overlapping taxes to make compliance easier, especially for small businesses and informal traders.

Increase Revenue Efficiency: Aims to boost Nigeria’s tax-to-GDP ratio from 10% (below the African average of 16–18%) to 18 per cent by 2026 without raising taxes on essential goods.

Advertisement

Reduce Financial Burden: Provides relief for low-income households and small businesses while ensuring high-income earners and luxury consumers contribute more.

READ ALSO:Senate Passes Two Tax Reform Bills

Fund Public Services: Increased revenue will support infrastructure, healthcare, and education, reducing reliance on borrowing.

Advertisement

Who benefits and how
Low-Income Households:
Individuals earning up to ₦1 million ($650) annually receive a ₦200,000 rent relief, reducing taxable income to ₦800,000, exempting them from income tax.

VAT exemptions on essential goods and services (food, healthcare, education, rent, power, baby products) lower living costs.

Small businesses:

Advertisement

Businesses with an annual turnover below ₦50 million ($32,400) are exempt from company income tax.
Simplified tax filing without requiring audited accounts reduces compliance costs.

Large businesses:

Corporate tax rates drop from 30 per cent to 27.5 per cent in 2025 and 25 per cent thereafter.
Tax credits for VAT paid on expenses and assets allow businesses to recover the 7.5 per cent VAT.

Advertisement

Charitable, educational, and religious organisations:

READ ALSO:FG Sues Binance For $81.5bn In Economic Losses, Back Taxes

Tax incentives for non-commercial earnings, encouraging community-focused activities.
Impact on different groups
Low-Income Earners: Benefit most from income tax exemptions and lower costs for essentials, increasing disposable income.

Advertisement

Small Businesses and informal traders: Simplified rules and tax exemptions encourage compliance and reduce financial strain, potentially formalising more businesses.

High-income earners and luxury consumers face higher VAT on luxury goods and premium services, plus capital gains tax on large share sales.

Government: Expects increased revenue for public services without overburdening vulnerable citizens.

Advertisement

Why reforms were needed

Nigeria’s tax system was outdated, inefficient, and disproportionately harsh on low-income groups.
The low tax-to-GDP ratio (10%) limited funding for critical services like healthcare and infrastructure.
Overlapping taxes and complex rules deterred compliance, especially among small businesses and informal traders.
Public and expert reactions

READ ALSO:JUST IN: Tax Reforms Here To Stay, Says Tinubu

Advertisement

Positive sentiment: Small business owners welcome tax exemptions but seek clarity on enforcement to avoid unexpected levies.

Low-income earners appreciate relief on essentials but remain cautious about implementation.
Taiwo Oyedele, head of the Presidential Fiscal Policy and Tax Reform Committee, claims 90% public support, emphasising that success depends on awareness and trust.

The reforms align with Tinubu’s administration’s goal to reduce economic inequality and boost fiscal capacity without overburdening citizens.

Advertisement

By encouraging voluntary compliance and reducing reliance on loans, Nigeria aims to strengthen its economy and fund development projects.

These reforms mark a significant step toward a fairer, more efficient tax system, with a focus on supporting vulnerable groups while fostering economic growth. However, their success hinges on transparent enforcement and public trust. For further details, you can refer to official statements from the Nigerian government or credible news sources covering the reforms.
(PUNCH)

Advertisement
Continue Reading

Trending

Exit mobile version