HP Innovation Journal Issue 14: Spring 2020 | Page 29
the overhead of an attack and reap greater rewards in
the process. As a result, we see most of these groups
seeking out the targets that require the smallest possible
investment. A multilayered defense helps protect against
these opportunistic attacks and provides early warning
of malicious and persistent targeted attacks. The mistake
many make is assuming that the layers of defense can
live only at the software level. Building cyber-resilience
requires end-to-end security coverage that starts with
hardware. Whether it’s ensuring recovery of endpoint
devices for business continuity, or detecting intrusions and
remediating attacks, we continue to lead the industry in
designing hardware-enforced, self-healing devices as a first
line of defense. selecting the right trusted partners is key to creating and
maintaining a secure, resilient infrastructure. It’s critical
to choose partners capable of doing more than simply
reacting to current threats. With a partner to help stay
ahead of ever-changing threats, businesses can give their
security posture the attention it needs—without losing
focus on the critical activities that drive their bottom
line. HP is committed to being the partner of choice to
help organizations large and small win against a new,
highly professional breed of cybercriminals, but we can’t
do it alone. To succeed on this journey, we need our own
partners to join the fight, developing their ability to advise
on security and being the trusted partners our collective
customers need.
The deep resources and advanced skills of criminal
organizations mean that companies large and small
need to approach security as a mind-set rather than a
compliance goal or a siloed function. For organizations
unable to formulate this on their own (and most cannot), 1. BBC, 2017
2. Cybersecurity Jobs Report, 2019
3. Verizon, Data Breach Investigations Report, 2019
4. Ponemon Institute, State of Endpoint Security Risk, 2020
5. HP and Spiceworks, Print Security, 2017
6. HP, LoJax UEFI Rootkit Overview, 2018
7. Bromium, Into The Web of Profit, 2018
27