Submitted via IRC for TheMightyBuzzard
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint threats are a growing concern, companies are not efficiently protecting their proprietary data, and the cost and complexity of reducing endpoint risks are at an all-time high.
The study also revealed organizations are finding it increasingly difficult to identify dark endpoints — the rogue, out-of-compliance, or off-network devices that create blind spots and increase an organization's vulnerability to attack.
While confidence in endpoint security ranked low, the IT security professionals surveyed believe that close to 60 percent of the hours currently invested in the capture and evaluation of intelligence surrounding the true threats, to both compliance and proprietary data, can be saved each week by deploying automated solutions.
[...] "Managing endpoint security and protecting proprietary data is more than an IT issue, it's increasingly a global business performance and national security concern," said Geoff Haydon, CEO, Absolute. "This study along with recent ransomware attacks and high-profile data breaches show the danger of today's endpoint blind spots, and underscore that automation and newer approaches to endpoint security are key to safeguarding endpoints and the sensitive data on them for optimal business performance."
It can also cost you bruising about the head and face when you try to blame your admins.
Source: https://www.helpnetsecurity.com/2017/06/13/poor-endpoint-security/
(Score: 2) by c0lo on Tuesday June 27 2017, @12:19PM
God God, how inefficient!!!
Quickly, install some antimalware/security systems on those endpoints and you'll:
a. waste on average $5 millions/year in license fees/update subscriptions with mild guarantees of increased security**
b. waste another $5 millions in lost productivity and extra energy because your "end-points" are slowed down to a halt by "realtime detection", while still running their CPU-es red hot and with fans whirling at full speed
c. some extra petty change on the tune of one server+bandwidth (in the cloud or in your rack) to support the "management solution" side of your security solution. Perhaps even employ an extra "admin monkey" to customize/supervise this solution and be "on call" for just in case.
Been there, seen that.
---
** Yes,you will be protected if you aren't a victim in the first 3 weeks of the threat in the wild, until new detection signatures/rules are crafted and released as an update. Because this is the average duration for the:
1. detect a new threat in the wild
2. analyze it
3. design the countermeasure
4. test the countermeasure on all your supported platforms. The cure/blocking/prevention of the same attack in the future testing goes in minutes/hours; it is the regression tests and the tests against false positives that spans over (many) days/weeks - why do you think that, every now and then, an antivirus "disinfects" an operating system library and you can no longer use your Windows system?
5. package your solution as an update and test that the update is seen, downloaded and applied on all platform
6. finally release the update
https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford