Endpoint Security

Share on facebook
Share on google
Share on twitter
Share on linkedin
endpoint security
July 9, 2020

What is Endpoint Security

In many organizations, employees use personal devices, such as laptops and cell phones, to connect to a corporate network, thereby allowing them to work remotely. However, when employees have their own devices, these become points at which an attacker can launch malicious activity. This gives rise to an important issue, that has become even more salient during the pandemic’s work-from-home structure: endpoint security.

Endpoint security concerns the monitoring, protection and restriction of endpoints – in this case, personal devices connected to corporate networks. Without proper security mechanisms in place, these devices become cyberattack targets and can be mishandled if lost or stolen. The below information present only a succinct and abridged overview of endpoint security. If your organization requires endpoint protection and services, contact us at CDG for more information and expert guidance.

How Do You Secure Endpoints?

Secure Remote WorkingIn order to ensure an organization is not vulnerable to attacks, every possible hole and shortcoming must be addressed. Therefore, every single endpoint must be, and remain, secured at all times.

First, the organization should be aware of who possess and uses each endpoint. If two employees share the same personal device (like a home computer), both users must be identified. To continue with the home computer example, the organization must also track where the endpoint is located and what kind of data/websites it can access. If an employee cannot use a specific range of websites while at work, they should not be able to access said range while using a home computer that is connected to the same corporate network. Therefore, organizations should be blocking unauthorized websites. Given the need to control who accesses the home computer’s portal to the corporate network, the organization must also authenticate and limit user logins.

Malware can enter through the most inconspicuous of ways. Users can accidentally become victims of attacks by downloading unsafe applications. Therefore, there must also be limits on the applications that can be used by each personal device. To go back to the home computer, said device must be restricted from downloading malicious applications that have not been permitted for use by the organization’s security team.

One of the most important aspects of endpoint security is the detection, management, and response to potential threats and attacks. Advanced computing systems can be used to detect suspicious activity occurring on personal devices. If an endpoint has received a phishing email, is exposed to a virus, has been penetrated by malware, or any other host of attacks, the security team must receive an immediate notification. This must be at a scale that meets the organization’s needs.

Furthermore, if an attack takes place or is ongoing, the team and the endpoint security must have in place methods and procedures to respond and defend against threats. As well if data is lost, ensure it was encrypted in the first place. By having a robust endpoint security system in place, every user (and the organization) can be more secure.

 

Sources & References:

PaloAltoNetworks

McAfee

CDG Security Team

CDG Security Team

Incident Response

If you have been the victim of a cyber attack, contact us right now.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team