HP Innovation Journal Issue 14: Spring 2020 | Page 29

the overhead of an attack and reap greater rewards in the process. As a result, we see most of these groups seeking out the targets that require the smallest possible investment. A multilayered defense helps protect against these opportunistic attacks and provides early warning of malicious and persistent targeted attacks. The mistake many make is assuming that the layers of defense can live only at the software level. Building cyber-resilience requires end-to-end security coverage that starts with hardware. Whether it’s ensuring recovery of endpoint devices for business continuity, or detecting intrusions and remediating attacks, we continue to lead the industry in designing hardware-enforced, self-healing devices as a first line of defense. selecting the right trusted partners is key to creating and maintaining a secure, resilient infrastructure. It’s critical to choose partners capable of doing more than simply reacting to current threats. With a partner to help stay ahead of ever-changing threats, businesses can give their security posture the attention it needs—without losing focus on the critical activities that drive their bottom line. HP is committed to being the partner of choice to help organizations large and small win against a new, highly professional breed of cybercriminals, but we can’t do it alone. To succeed on this journey, we need our own partners to join the fight, developing their ability to advise on security and being the trusted partners our collective customers need. The deep resources and advanced skills of criminal organizations mean that companies large and small need to approach security as a mind-set rather than a compliance goal or a siloed function. For organizations unable to formulate this on their own (and most cannot), 1. BBC, 2017 2. Cybersecurity Jobs Report, 2019 3. Verizon, Data Breach Investigations Report, 2019 4. Ponemon Institute, State of Endpoint Security Risk, 2020 5. HP and Spiceworks, Print Security, 2017 6. HP, LoJax UEFI Rootkit Overview, 2018 7. Bromium, Into The Web of Profit, 2018 27