Submitted via IRC for TheMightyBuzzard
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint threats are a growing concern, companies are not efficiently protecting their proprietary data, and the cost and complexity of reducing endpoint risks are at an all-time high.
The study also revealed organizations are finding it increasingly difficult to identify dark endpoints — the rogue, out-of-compliance, or off-network devices that create blind spots and increase an organization's vulnerability to attack.
While confidence in endpoint security ranked low, the IT security professionals surveyed believe that close to 60 percent of the hours currently invested in the capture and evaluation of intelligence surrounding the true threats, to both compliance and proprietary data, can be saved each week by deploying automated solutions.
[...] "Managing endpoint security and protecting proprietary data is more than an IT issue, it's increasingly a global business performance and national security concern," said Geoff Haydon, CEO, Absolute. "This study along with recent ransomware attacks and high-profile data breaches show the danger of today's endpoint blind spots, and underscore that automation and newer approaches to endpoint security are key to safeguarding endpoints and the sensitive data on them for optimal business performance."
It can also cost you bruising about the head and face when you try to blame your admins.
Source: https://www.helpnetsecurity.com/2017/06/13/poor-endpoint-security/
(Score: 0) by Anonymous Coward on Tuesday June 27 2017, @12:42PM
zeh endpoint, eh? fancy name for:
1) the user device (desktop computer, tablet, phone, wat?)
-or-
2) the router between soemthing and soemthing. mostly probably the big bad internet and the (good) internal network?
my endpoint, second meaning, is only "visible" to one computer.
also this computer needs to be running, which mostly it isn't.
also this endpoint-configuring computer is behind another "end-point" (read:firewall) and this endpoint is only configurable from yet another computer.
both computers run different OSes.
the logic being, if i can configure the end-point, then a intruder compromising this computer could too. making the end-point "very invisible" also reduces attach surface, maybe? eh?
but as somebody pointed out the other day, all is for naught, the "endpoints" are ubiquiti : P