From The Desk Of Chuck Leaver CEO Ziften Technologies
With the introduction of bring your own device (BYOD) methods and cloud computing the securing of particular endpoints has become more difficult, as administrators could be making ease of data access a priority over security. The risks are there however, since most of the present generation of endpoint security software applications have not been customized to defend from aggressive hacking and destructive cyber attack methods that target specific endpoints as the launch pad for attacks that are widely distributed.
There was a really famous endpoint attack that happened in recent times where a malware strain named Comfoo was utilized to jeopardize the networks of many multinational organizations back in 2010. The Comfoo malware included a number of custom designed backdoor Trojans and exploits that might continually distribute malware. A more serious consequence was that this malware could cause harmful data leakage by scraping account and network info and monitor all user input, according to CRN contributor Robert Westervelt. It is thought that the Comfoo malware might have been a part of an innovative cyber espionage project, because of the approach that was applied and the evasion of standard endpoint monitoring.
Using email phishing and social engineering the malware had the ability to jeopardize targeted devices, which highlights how ripe endpoints have actually ended up being for malware infiltration, so says Jason O’Reilly, security executive. When he was talking to ITWeb, O’Reilly stated that standard endpoint software does not sufficiently account for access from areas beyond the IT department most of the time, and it does not limit data exposure to authorized parties through using access controls.
O’Reilly specified that “endpoint security services need to provide layered defense that exceeds signature-based detection just to include heuristic-based detection and polymorphic-based detection.” “Today’s networks are exposed to hazards from several sources.”
Real Time Threat Catching And Report Generation
The high stakes for control techniques and endpoint security were recognized by business consulting company Frost & Sullivan, as they felt both of these areas were under pressure from both external hackers and the insatiable demand from workers for device choice versatility.
Chris Rodriguez, Frost & Sullivan analyst mentioned “enterprise IT organizations now deal with significant pressure to enable staff members to access the corporate network and files from their own personal devices.” “Considering their relatively universal nature, quick data connections, and powerful hardware and os, these devices represent prime targets for hackers.”
When asked what organizations can do to tighten up on the unique weak points of mobile hardware, O’Reilly recommended that any solutions must offer clear and thorough visibility into exactly what is happening on each endpoint so that action can be taken quickly when any threats are detected.