HP Innovation Journal Issue 14: Spring 2020 | Page 28

even the most sophisticated document-borne or web-based malware, straight out of the box. REGAINING CONTROL As the potential attack surface expands, the hard edges of the systems controlled by a single business are dissolving into distant memory. Today, the IT systems of a modern business are completely enmeshed with those of partners and suppliers. As such, the risks business leaders are held accountable for often far exceed what they can practically manage. With so much of the attack surface outside of their grasp, businesses must double down on securing the systems within their control. Endpoint devices, for instance, are often overlooked. Up to 68% of IT security professionals said their company was hit by one or more endpoint attacks over the past 12 months that successfully compromised data or IT infrastructure, an increase of 54% from 2017. 4 Every laptop, desktop, smartphone, tablet, application, IoT device, smart meter, and remote connection attached to a company’s network represents a potential weak link—and an opportunity for bad actors to wreak havoc on a company’s systems. Despite that danger, fewer than one in five enterprise IT decision-makers consider printers a high-risk target for a security breach. 5 At the same time, attacks on firmware and embedded devices have moved from theory to reality. 6 We can only address the rise in attacks if vendors put security first, making it a critical part of how they design and build devices, beginning with the hardware. These are some of the reasons why HP has developed hardware-enforced, layered security, built into the architecture of business PCs and enterprise printers alike. This approach provides robust security foundations anchored in hardware, which will help strengthen the rest of an organization’s defenses. “For small- and medium-sized businesses this problem becomes even more acute. …Attacks have now become cheap enough to execute that criminals are moving down-market.” they’re innovating with the same sense of urgency as any legitimate company. The emergence of “hivenets”— intelligent, adaptive autonomous malware networks—is one example of this new stage of escalation. Cybercriminals have been able to use self-learning strategies to create intelligent botnets that need minimal human supervision to target an ever wider range of vulnerable systems. But black-hats aren’t just seeking a competitive edge through machine augmentation, they’re also hunting for the weak points that new technologies create. As a result, helping businesses future-proof against the unknown has become table stakes. This is why HP has been a leader in using deep learning and advanced analytics technologies across PCs and printers, to help detect malicious software based on the malware’s behavioral traits, rather than scanning for a previously identified digital signature. This approach helps identify and stop never-before-seen strains of malware before they cause trouble. Delivering such capability “out of the box” is key to helping our customers, of any size, simplify and automate the process of hardening and managing their IT estate. STAYING AHEAD THE REWARDS OF RESILIENCE Over the past few years criminal networks have poured resources into developing ever more sophisticated, novel, and innovative attacks. Whether it’s using AI to mutate known malware into new forms, or automating attacks, Like any business, criminal gangs are concerned with profit. With a cybercrime economy worth over $1.5 trillion, 7 they’ve had more than a little success. Their adoption and deployment of new technology is designed to decrease 26 HP Innovation Journal Issue 14