April 2, 2018 By Douglas Bonderud 2 min read

Company spending on hardware is trending up. That’s the word from a recent Spiceworks survey that analyzed emerging trends in information technology. According to the report, 44 percent of businesses expect to boost IT budgets through 2018, with 31 percent of funds allocated for new hardware.

Study Examines Emerging Trends in Information Technology

The Spiceworks study found that enterprises are spending more on desktops, laptops, servers and networking hardware. End of life (54 percent) and increased growth (53 percent) drive the bulk of these new hardware purchases. This is a marked departure from recent years, which saw both shrinking IT departments and trends toward rented resource consumption over physical investment.

But as end-user expectations increase and mobile devices become essential to business’ bottom lines, companies can’t put off hardware purchasing until it’s more convenient — spending is a requirement to stay competitive. According to Network World, double-digit growth is in the cards for hardware purchasing this year, with investment firm Morgan Stanley upgrading its view of the market from “cautious” to “attractive.”

More Endpoints, More Problems

More hardware means more endpoints and, ideally, improved corporate efficacy. It also drives increased risk since network devices, desktops and laptops leverage technology that may be susceptible to threats.

While emerging trends in information technology still include a focus on securing applications and detecting software threats, there’s also a need to securely handle and dispose of old hardware. Simply tossing or recycling old devices creates a potential attack avenue for cybercriminals. Individuals who manage to get their hands on decommissioned hardware that hasn’t been properly severed from corporate networks could initiate a breach that would seemingly originate from approved devices.

There’s also the problem of existing structure. Malicious actors with the ability and time to examine ditched devices could uncover common hardware components that are vulnerable to well-known threats and then apply this knowledge to corporate infrastructures at large.

Properly Disposing of Old Hardware

According to TechRepublic, companies “must standardize their procedures for decommissioning and disposing of old IT hardware as part of their comprehensive data security protocol.” Tossing hardware isn’t fire-and-forget — devices must be properly disconnected, wiped for critical data, and then securely recycled or disposed of in a way that prohibits reconstruction and information mining.

With IT budgets on the rise and new hardware atop the spending list, enterprises must secure devices as they’re deployed, while they’re in use and during decommission.

More from

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today