Hybrid working leaves IT departments scrambling to shield against ‘destructive’ firmware attacks


As the workforce becomes more distributed, the dynamics around firmware security and how IT teams handle it is changing, a new report from HP Wolf Security says, adding that IT departments are facing an uphill battle.
Firmware is essentially software, but built directly into the hardware. It doesn’t require an operating system, drivers, or APIs. Instead, it’s the firmware that guides the device as it executes its tasks and communicates with other devices.
The poll of 1,100 IT leaders discovered that for more than eight-in-ten (83%), firmware attacks against laptops and PCs are now a significant threat. Furthermore, for three-quarters (76%), firmware attacks against printers are also a major threat.
Shadow IT
The same report also states that managing firmware became harder, and is now taking longer, which is also creating security gaps. For two-thirds (67%) of respondents protecting, detecting, and recovering from firmware attacks has become harder and longer, all due to remote working being the norm.
As a result, four in five worry about being able to respond to endpoint (opens in new tab) firmware attacks.
Adding insult to injury is the fact that for many organizations, device security is not always front and center, HP further found. Many organizations, the report states, are still using technology without baked-in security. What’s more, employees are constantly engaged in Shadow IT (using gear and software that wasn’t approved of, by the IT), especially when working remotely.
In fact, 68% of office workers that purchased devices to support remote work said they weren’t paying much attention to security. Almost half (43%) did not call the IT department to have their new gear set up.
For Dr. Ian Pratt, Global Head of Security for Personal Systems at HP, firmware attacks are extremely disruptive as they’re harder to detect and remediate, compared to traditional viruses (opens in new tab), or malware (opens in new tab).
“This increases the cost and complexity of remediation considerably, particularly in hybrid environments where devices are not on site for IT teams to access. Having more endpoints sitting outside of the protection of the corporate network also reduces visibility and increases exposure to attacks coming in via unsecured networks,” Pratt concluded.
Audio player loading… As the workforce becomes more distributed, the dynamics around firmware security and how IT teams handle it is changing, a new report from HP Wolf Security says, adding that IT departments are facing an uphill battle. Firmware is essentially software, but built directly into the hardware. It…
Recent Posts
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010