With security threats becoming more advanced, Security and Information Management need to be a top priority. Education and awareness are essential. Whether its best practices, security trends, or developing a foundational knowledge of security technologies, being informed is paramount. TechData’s Security Practice Foundations blog series can help you build a strong foundation of security knowledge.
What is Endpoint Security?
By 2020, the average person is expected to have at least six connected devices.(1) The increase in BYOD environments, means more rogue access points that an attacker can exploit. Endpoint security refers to securing endpoints, like desktops, laptops and mobile devices, against malware and data theft. Most endpoints are connected to the internet which makes them easier targets than anything inside the firewall. Once one has been infected, it can spread to other devices and hackers can use it as a launching point to do whatever they want.
Tools and Solutions to Help
- Anti-Virus and Anti-Malware software: They’re widely available and a good first step to securing your devices. When a threat is detected, they not only checks it’s signature against a database of signatures of known malicious threats but nowadays, they also check the behavior of a file to see if it’s acting maliciously.
- Device and Patch Management: Keeping on top of devices can decrease the likelihood of attacks. Patch management takes care of the most common way attacks happen, by exploiting known threats that are fixed by patches on devices where they haven’t been applied. Going back to IAM, make sure devices are managed from the second they’re acquired up to when they’re decommissioned and manage the devices people bring in.
- Zero-Day Threat Detection: Sandboxing lets you open applications in an isolated environment away from the rest of the system. It’s a basically quarantining something suspicious to prevent it from affecting the rest. This can also protect against unknown zero day threats.
Interested in assessing your network and developing a stronger security practice? Contact Tech Data’s Security Solutions specialists at email@example.com.
Keep an eye out for our final post in the Security Practice Foundations series: Compliance. In case you missed it, read our previous blog posts in the series: Identity and Access Management, Security Intelligence, Network and Perimeter Security, and Data and Application Security.
About the Author
Divya Prabakaran is an intern with Tech Data’s Security team. She currently is pursuing a bachelor’s degree in Cybersecurity at the University of South Florida. When she’s not writing security blogs or doing schoolwork, she can be found in her kitchen baking and taste testing her new recipes.