Endpoint Security: The New Frontier – Security Today

Endpoint Security: The New Frontier

Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.

Many organizational networks are growing rapidly. New devices are constantly being added, cloud services are incorporated and remote work is becoming more common. With each connection that is added, an endpoint is formed. These endpoints make it possible for employees and customers to access your networks and services.

Unfortunately, endpoints are also common points of entry for attackers. A study by Ponemon found that 64 percent of respondents have experienced a breach that started with the successful exploitation of an endpoint. Adopting tools and practices designed to protect your endpoints can help you avoid this risk and can keep your data secure.

To gain a better understanding of what is needed from endpoint security, it helps to know what sort of vulnerabilities exist. Below are a few types of attacks that are or are becoming more common. However, its important to keep in mind that many more types of attacks exist and attackers are developing new methods every day.

Ransomware

Ransomware attacks leverage malware to encrypt systems or data. Device or system owners are then offered a decryption key in exchange for payment or valuable information.

These attacks affect endpoints when users are allowed to upload or download files containing malware. This is possible when devices dont have antivirus installed, users are allowed unrestricted access to the Internet, or when user interfaces allow unvalidated user inputs. When a ransomware attack occurs on an endpoint it may affect just that device or your entire system, depending on what internal access the endpoint allows.

Cryptojacking

Cryptojacking is when attackers take over system resources and redirect those resources to the mining of cryptocurrency. This is typically done through scripts that gain control over a users browser or device.

Cryptojacking can affect endpoints when users are allowed to run or upload unverified scripts. For example, if you allow users to add browser extensions or if you accept form inputs from web portals without restriction.

Read this article:

Endpoint Security: The New Frontier - Security Today

Related Posts

Comments are closed.