The Reality of Hardware-level Security: Companies Need It and They Need It Now
- December 12, 2019
Organizations are trying to protect their devices against the backdrop of a changing cybersecurity landscape. At the same time, hackers are working just as hard – if not harder – to infiltrate security measures. As security tools get more advanced, attackers find new ways to bypass them. The latest tactic used by hackers is attacking IT systems below the operating system (OS) of a device. Attacks at the hardware-, firmware- or silicon-level can expose organizations to systemic damages.
To study the effects of these types of intrusions, the Dell Technologies Hardware Security study conducted by Forrester Consulting surveyed IT, security, risk and compliance decision-makers at companies with more than 500 employees. Below is a topline summary of the commissioned study’s findings.
Hardware-level Breaches are the Latest Reality
Current Strategies Don’t Prepare for Hardware-level Attacks
Nearly two-thirds (63%) of organizations recognize they have a moderate to extremely high level of exposure to threats to the hardware supply chain, yet only 59% have implemented a hardware supply chain security strategy.
Hardware Security Vendors are a First Line of Defense
Chip manufacturer validation and supply chain validation are viewed as critical to addressing hardware-level threats. Forty-seven percent of surveyed companies reported adopting and investing in supply chain validation initiatives now and 30% plan to implement in the next 12 months. Thirty-eight percent plan to adopt chip manufacturer validation in the next year.
Bottom line, hardware security is at the core of any computing system, and exploitation at this level is devastating. Once you are hacked, your endpoint, data and entire enterprise are at risk
Dell Technologies understands the importance of building security into the foundation of our devices. We are leading the way by fortifying our trusted devices both below and above the OS, while the rest of the PC industry prioritizes security apps and defenses that only sit above the OS. This difference in approach has led Dell Technologies to claim the industry’s most secure PCs – hands down. You can read more about how Dell architects a system of security measures, built from the inside out here.
To read the full Dell Technologies Hardware Security study conducted by Forrester Consulting, “BIOS Security – The Next Frontier for Endpoint Protection,” please click here.