Endpoints are the most vulnerable components of your computing environment, and yet most organizations let their controls degrade. A recent study by Absolute Software found that 76% of organizations have increased their use of endpoint devices since the onset of Covid-19. To adapt to the shifting threat landscape, 82% of IT security decision makers had to re-evaluate their existing cybersecurity policies to meet this growing demand for mobility. As endpoints grow increasingly complex - whether due to bring your own device (BYOD) work environments, or internet of things (IoT) devices touching the network - risk is increasing.
For most organizations, the security triad consists of data encryption, endpoint security tools to fend off cyber threats, and client and patch management to ensure applications are free of vulnerabilities. When the world went remote, this became more complicated. Absolute found that 60% of organizations only have insight into 3/4 of their network devices. The remaining 25% is a blind spot that makes real-time incident response impossible. Absolute identified four recurring trends across organizations:
Overall, there has been a 17% increase in the amount of sensitive data on end-user devices, year over year. On average, enterprises have an average of 96 unique applications per device. And even though much of this complexity is driven by security tools, increased complexity can become its own vulnerability.
A recent Ponemon study highlights how this complexity manifests. Participants were asked to list the security risks their are most concerned about in their organization. Their responses are presented in descending order below:
Of course, the cost of implementing and maintaining endpoint security isn't the only factor driving these concerns. Sophos found that the average organization loses 41 days per year investigating non-issues. 80% struggle to perform thorough threat detection and response, often because they lack the necessary security expertise, or their internal teams are already bogged down with break-fixes. This leaves a lot of time for actual threats to go unnoticed - up to 13 hours for most businesses.
To combat endpoint degradation, and IT fatigue, your tech leadership needs to have a thorough understanding of what's happening on an organization-wide to device-by-device basis. This level of oversight is critical in thwarting threats, responding to suspicious events, and keeping employees secure both in and out of the office network. Here are five ways to move your company in this direction:
If you are looking to implement changes for secure endpoints, but don't know where to begin, consider reaching out to iCorps for a free consultation.