Dr. Ian Pratt, Global Head of Security for Personal Systems at HP, explains: "Physical attacks are riskier and more difficult to execute, so they tend to be targeted and organized - for example, as part of a nation-state campaign or corporate espionage. But the lucrative market for selling access to corporate networks means that more opportunistic attacks - such as briefly connecting a Thunderbolt device to an unattended PC - can be worth the risk to a cybercriminal."
Today, hardware manipulation can reach far beyond the office. Where previously the focus was primarily on protecting corporate networks, this has been forced to expand to endpoint security in the workplace. But these days, the workplace can be virtually anywhere.
Malicious firmware is complicated to detect with a software solution before it causes a problem. Moreover, users of this attack technique are extra dangerous.
Each PC maker offers a slightly different solution. For example, Dell works with CrowdStrike, and Lenovo can use SentinelOne security. HP keeps it in-house with the Enterprise Security Edition.
#cybersecurity #hp-enterprise-security-edition #hardware-threats #endpoint-security #it-security-solutions
Collection
[
|
...
]