April 2, 2018 By Douglas Bonderud 2 min read

Company spending on hardware is trending up. That’s the word from a recent Spiceworks survey that analyzed emerging trends in information technology. According to the report, 44 percent of businesses expect to boost IT budgets through 2018, with 31 percent of funds allocated for new hardware.

Study Examines Emerging Trends in Information Technology

The Spiceworks study found that enterprises are spending more on desktops, laptops, servers and networking hardware. End of life (54 percent) and increased growth (53 percent) drive the bulk of these new hardware purchases. This is a marked departure from recent years, which saw both shrinking IT departments and trends toward rented resource consumption over physical investment.

But as end-user expectations increase and mobile devices become essential to business’ bottom lines, companies can’t put off hardware purchasing until it’s more convenient — spending is a requirement to stay competitive. According to Network World, double-digit growth is in the cards for hardware purchasing this year, with investment firm Morgan Stanley upgrading its view of the market from “cautious” to “attractive.”

More Endpoints, More Problems

More hardware means more endpoints and, ideally, improved corporate efficacy. It also drives increased risk since network devices, desktops and laptops leverage technology that may be susceptible to threats.

While emerging trends in information technology still include a focus on securing applications and detecting software threats, there’s also a need to securely handle and dispose of old hardware. Simply tossing or recycling old devices creates a potential attack avenue for cybercriminals. Individuals who manage to get their hands on decommissioned hardware that hasn’t been properly severed from corporate networks could initiate a breach that would seemingly originate from approved devices.

There’s also the problem of existing structure. Malicious actors with the ability and time to examine ditched devices could uncover common hardware components that are vulnerable to well-known threats and then apply this knowledge to corporate infrastructures at large.

Properly Disposing of Old Hardware

According to TechRepublic, companies “must standardize their procedures for decommissioning and disposing of old IT hardware as part of their comprehensive data security protocol.” Tossing hardware isn’t fire-and-forget — devices must be properly disconnected, wiped for critical data, and then securely recycled or disposed of in a way that prohibits reconstruction and information mining.

With IT budgets on the rise and new hardware atop the spending list, enterprises must secure devices as they’re deployed, while they’re in use and during decommission.

More from

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

3 min read - Rhode Island is grappling with the fallout of a significant ransomware attack that has compromised the personal information of hundreds of thousands of residents enrolled in the state’s health and social services programs. Officials confirmed the attack on the RIBridges system—the state’s central platform for benefits like Medicaid and SNAP—after hackers infiltrated the system on December 5, planting malicious software and threatening to release sensitive data unless a ransom is paid.Governor Dan McKee, addressing the media, called the attack “alarming”…

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today