The post-covid, work from home era poses new challenges for IT security. Changed working practices are opening up new vulnerabilities, made worse by fragmented technology ecosystems and overstretched IT teams. In the home, lines are blurring between business and personal endpoint devices. A recent report for HP Wolf Security, titled Blurred Lines and Blindspots, found that 63% of UK office workers working from home during the pandemic had used business devices for personal use, or vice versa. 12% had let someone else within their household use their work device.\nIn response, cybercriminals are growing ever more relentless, hunting down opportunities to exploit these new weaknesses to attack employees, the enterprise and its data. 54% of ITDMs from around the globe who responded to the HP Wolf Security survey had seen evidence that phishing attacks were on the rise, while 85% feared that employee behaviour was increasing their organisation\u2019s risk of a security breach. 45% had seen evidence of compromised printers being used as an attack point in the past year.\nOrganisations can\u2019t shy away from these challenges. They need to meet them head on through a security approach that transforms potential weaknesses into points of strength. They must combine the power of AI with the latest, hardware-based security technology and a zero-trust model that takes nothing for granted.\nThis is the approach HP outlined at a recent Security Masterclass event. \u2018A more digital world doesn\u2019t have to mean a more vulnerable world\u2019 said Dave Prezzano, Managing Director, HP UK and Ireland. \u2018It does mean that we must be constantly flexible, proactive and reactive to ensure resilience in continually evolving digital environments.\u2019 For HP, the key to doing so lies in HP Wolf Security; a new breed of endpoint security[I] rooted in zero trust principles and designed to aid organisations in protecting themselves, their customers and their employees from attack.\nHP Wolf Security works through defence in depth, covering endpoints with layers of protection that, together, both guard against attacks and minimise their impact. Starting at the hardware level and extending across software and services. HP Wolf Security helps organisations to defend themselves against both known and unknown threats \u2013 combining hardware-enforced software and security features with industry-leading endpoint security services[ii]. HP Sure Click Pro and HP Sure Click Enterprise[iii], key parts of the HP Wolf Pro Security and Wolf Enterprise Security[iv] platforms, open files, applications and webpages inside micro Virtual Machine containers, so that any malware that attempts to execute can only affect and access what\u2019s in the container, not the operating system, applications or data beyond. Email is neutralised as an attack vector, while it becomes more difficult to steal credentials through phishing attacks.\nHP Sure Sense and Sure Sense Pro[v] provide another layer of protection, leveraging cloud-based, deep learning technologies to guard endpoints against evolving threats, even extending to the zero-day exploits which conventional anti-virus solutions can\u2019t detect. And where internal IT teams find themselves stretched, HP\u2019s Wolf Pro Security service can step in to help, providing endpoint security and specialist expertise to monitor and manage the whole fleet.\nYet HP Wolf Security goes further, securing endpoint devices at and below the operating system level. With HP Sure Start[vi], the BIOS recovers automatically from firmware attacks, restarting from a known safe copy and self-healing, while HP\u2019s in-memory breach detection capabilities spot signs of intrusion and provide automatic remediation. HP Sure Run[vii] keeps vital security processes up and running even if malware attempts to shut them down, while HP Sure Recover[viii] allows a compromised PC to restore its OS automatically over a network connection, with no IT support required.\nAnd when IT needs control, HP Wolf Security technology delivers it through technologies like HP SureAdmin[ix], which creates a digital signature that allows IT admins to securely manage BIOS configurations over the network. Meanwhile, the HP Endpoint Security Controller puts an embedded security processor into corporate laptops, where it operates as an isolated control centre through which IT can monitor vulnerabilities and quickly recover a compromised PC.\nBeyond this, HP understands that PCs are not the only attack surface. Printers, whether in the home or accessible across a network, can also be repurposed by cybercriminals as a beachhead for further assaults on local or office-based systems. That\u2019s why HP developed not only the world\u2019s most secure PCs[x], but the world\u2019s most secure printers[xi]. Here, HP Wolf Security delivers continuous hardware-based protection and firmware updates, while also ensuring the privacy of documents during scanning, printing and sending, with dynamic passwords to safeguard against unauthorised access.\nWe\u2019re in an era of change, where employees and organisations across different industries are still adjusting to different styles of working, and attackers are ready to exploit any weakness. Yet with the right approach and HP Wolf Security technology and services, organisations of every size have the means to fight back. Where lines get blurred, HP Wolf Security puts endpoint security back in focus \u2013 and IT back in control. \u2018Endpoint security is more vital than ever before as the first line of defence\u2019 says Dave Prezzano \u2018and HP Wolf Security unifies all of HP's endpoint security into one formidable force.'\nTo find out more about the new security landscape and how HP Wolf Security can help you navigate it, watch the HP Masterclass on-demand at HP Security Masterclass.\n[i]HP Security is now HP Wolf Security. Security features vary by platform, please see product data sheet for details.[ii]HP Services are sold separately and are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product.[iii]HP Sure Click Enterprise is sold separately and requires Windows 8 or 10 and Microsoft Internet Explorer, Google Chrome, Chromium or Firefox are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed.[iv]HP Wolf Enterprise Security is an optional service and may include offerings such as HP Sure Click Enterprise and HP Sure Access Enterprise. HP Sure Click Enterprise requires Windows 8 or 10 and Microsoft Internet Explorer, Google Chrome, Chromium or Firefox are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed. HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com\/requirements.\u00a0[v]HP Sure Sense is available on select HP PCs and is not available with Windows10 Home.\u00a0HP Wolf Pro Security Edition (including HP Sure Click Pro and HP Sure Sense Pro) is available preloaded on select SKUs\u00a0and, depending on the HP product purchased, includes a paid\u00a0 1-year or 3-year license. The HP Wolf Pro Security Edition software is licensed under the license terms of the HP Wolf Security Software - End-User license Agreement (EULA) that can be found at: https:\/\/support.hp.com\/us-en\/document\/ish_3875769-3873014-16 as that EULA is modified by the following: \u201c7. Term. Unless otherwise terminated earlier pursuant to the terms contained in this EULA, the license for the HP Wolf Pro Security Edition (HP Sure Sense Pro and HP Sure Click Pro) is effective upon activation and will continue for either a twelve (12) month\u00a0or thirty-six (36) month license term (\u201cInitial Term\u201d). At the end of the Initial Term you may either (a) purchase a renewal license for the HP Wolf Pro Security Edition from HP.com, HP Sales or an HP Channel Partner, or (b) continue using the standard versions of HP Sure Click and HP Sure Sense at no additional cost with no future software updates or HP Support.\u00a0[vi]HP Sure Start is available on select HP PCs.\u00a0[vii]HP Sure Run is available on select HP PCs.\u00a0[viii]HP Sure Recover is available on select HP PCs and requires an open network connection. You must back up important files, data, photos, videos, etc. before using HP Sure Recover to avoid loss of data.[ix]HP Sure Admin is available on select HP PCs and requires HP Manageability Integration Kit from http:\/\/www.hp.com\/go\/clientmanagement and HP Sure Admin Local Access Authenticator smartphone app from the Android or Apple store.[x]Based on HP\u2019s unique and comprehensive security capabilities at no additional cost among vendors on HP Elite PCs and HP Workstations with Windows and 8th Gen and higher Intel\u00ae processors or AMD Ryzen\u2122 4000 processors and higher; HP ProDesk 600 G6 with Intel\u00ae 10th Gen and higher processors; and HP ProBook 600 with AMD Ryzen\u2122 4000 or Intel\u00ae 11th Gen processors and higher.[xi]HP\u2019s most advanced embedded security features are available on HP Enterprise and HP Managed devices with HP FutureSmart firmware 4.5 or above. Claim based on HP review of 2021 published features of competitive in-class printers. Only HP offers a combination of security features to automatically detect, stop, and recover from attacks with a self-healing reboot, in alignment with NIST SP 800-193 guidelines for device cyber resiliency.