Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Tuesday June 27 2017, @11:08AM   Printer-friendly
from the wide-open-doors dept.

Submitted via IRC for TheMightyBuzzard

A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint threats are a growing concern, companies are not efficiently protecting their proprietary data, and the cost and complexity of reducing endpoint risks are at an all-time high.

The study also revealed organizations are finding it increasingly difficult to identify dark endpoints — the rogue, out-of-compliance, or off-network devices that create blind spots and increase an organization's vulnerability to attack.

While confidence in endpoint security ranked low, the IT security professionals surveyed believe that close to 60 percent of the hours currently invested in the capture and evaluation of intelligence surrounding the true threats, to both compliance and proprietary data, can be saved each week by deploying automated solutions.

[...] "Managing endpoint security and protecting proprietary data is more than an IT issue, it's increasingly a global business performance and national security concern," said Geoff Haydon, CEO, Absolute. "This study along with recent ransomware attacks and high-profile data breaches show the danger of today's endpoint blind spots, and underscore that automation and newer approaches to endpoint security are key to safeguarding endpoints and the sensitive data on them for optimal business performance."

It can also cost you bruising about the head and face when you try to blame your admins.

Source: https://www.helpnetsecurity.com/2017/06/13/poor-endpoint-security/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Tuesday June 27 2017, @12:42PM

    by Anonymous Coward on Tuesday June 27 2017, @12:42PM (#531883)

    zeh endpoint, eh? fancy name for:
    1) the user device (desktop computer, tablet, phone, wat?)
    -or-
    2) the router between soemthing and soemthing. mostly probably the big bad internet and the (good) internal network?

    my endpoint, second meaning, is only "visible" to one computer.
    also this computer needs to be running, which mostly it isn't.
    also this endpoint-configuring computer is behind another "end-point" (read:firewall) and this endpoint is only configurable from yet another computer.
    both computers run different OSes.

    the logic being, if i can configure the end-point, then a intruder compromising this computer could too. making the end-point "very invisible" also reduces attach surface, maybe? eh?

    but as somebody pointed out the other day, all is for naught, the "endpoints" are ubiquiti : P