Endpoint Protection Best Practices

endpoint protection

Cybersecurity has risen to the status of top-ranked business priority. In a world that is busy with the process of digital transformation, the continual threat of cyberattack can hold back progress and innovation until new technologies can be implemented.

Furthermore, cyberattacks that lead to data breaches are a risk that enterprises are not (and should not be) willing to take. The IBM Cost of Data Breach Report estimates that the average data breach price tag is $3.92 million worldwide. US company data breach expenses are on the high end of the spectrum - at $9.9 million. Research for PwC’s 21st Annual Global CEO Survey revealed that cybersecurity was the most common concern among US CEOs in 2018.

Cybersecurity isn’t only creating anxiety for enterprises, however. It’s keeping small business owners and startup founders up at night, too. The 2019 Verizon Data Breach Investigation Report states that 43% of breaches occurred at small businesses. Unlike a large enterprise that may be able to cover the costs associated with a data breach - including repairing systems, restoring data, and paying fines - those costs can be enough to cause a small business to close its doors for good.

In the current environment of cyberthreats and the risks they pose to your business, it’s crucial to protect endpoints — including PCs, laptops, servers, printers, and mobile devices — that could potentially provide hackers with access to your business systems and data.


Reasons Your Business Needs Endpoint Protection

Cyberattack vectors differ substantially. You need to protect your business from a variety of attacks, including:

Malware

An abbreviation of “malicious software,” malware is any software with the purpose of stealing data, interrupting operations, damaging devices, or other malintent. Malware takes many forms, but common types include viruses, trojans, and spyware. Hackmageddon reports this classification of cyberattacks was the largest in October 2019, accounting for 35.3 percent of all attacks.


Ransomware

A different variety of malware, ransomware encrypts files. Then, the attacker demands a ransom from victims to decrypt them and regain access to their data. If the victim doesn’t pay the ransom, the files remain inaccessible or are destroyed.


Zero-Day Exploits

Sometimes attackers act on computer vulnerability before developers have the opportunity to patch it. Zero-day attacks target those vulnerabilities and, because they are new attacks, can’t be detected by comparing malicious code to known databases.


Denial of Service

A denial of service (DoS) or distributed denial of service (DDoS) attack floods a web service, website, or other target with excessive traffic, causing it to crash. Attackers can use compromised computers and devices to carry out DoS attacks.


Attackers use various methods to deliver malware to an endpoint, such as:

  • Phishing: The most popular method that attackers use to steal information or get users to click on malicious links. The attacker crafts emails that look legitimate in an attempt to get the recipient to take action, like reply with sensitive information. This social engineering tactic has grown more sophisticated, with attackers researching their victims’ companies, collecting information that will help them sound more credible, and targeting people in the organization whose credentials could result in the largest quantity of monetizable data.

  • Account Hijacking: Attackers use stolen or “hijacked” account information to access a system or application.

  • Malvertising: Attackers know that people respond to online advertisements. Unfortunately, they capitalize on this fact by incorporating malware into Ads. One type of malvertising, “Clickjacking,” attacks people who click content on social media or other platforms.

  • URL Spoofing: Attackers build malicious websites with names similar to legitimate websites. The URL of the attacker’s created website is close enough to trick a user, and possibly get them to surrender log-in and other sensitive information. They also embed clickable links that deploy malware.


Build an Endpoint Protection Strategy, Don’t Just Deploy Solutions

The vast differences in cyberattack methods, the levels of your computing network that they target, and the role that human error can play create challenges that a single security solution can’t address by itself. Although it may be tempting to use the generic security settings within an application or download a freemium solution, your network would most likely still be vulnerable to certain kinds of attacks. Or, instead of looking for low-cost solutions, you may be tempted to throw money at disparate security solutions in an attempt to cover all the bases. Unfortunately that strategy can result in gaps that create dangerous vulnerabilities as well.

If you aren’t sure your current endpoint protection strategy is enough to protect your business, you aren’t alone. A Ponemon Institute Study, The Cost of Insecure Endpoints, found that 48 percent of companies are dissatisfied with their endpoint security solution and that those solutions cost organizations $6 million annually in problems with detection and response — and wasted time.

The best strategy is a well-planned, multilayered endpoint protection solution that includes:

  • Antivirus: Software designed to detect computer viruses and remove them from your computer or network.

  • Endpoint Detection & Response (EDR): Sometimes called advanced threat protection (ATP), this software monitors and detects suspicious activity on endpoints.

  • Firewall/URL Filtering: Solutions that block unwanted traffic based on preconfigured security rules.

  • Application Control: Software that blocks unauthorized applications from executing functions that can put network security and data at risk.

  • Email Security: A solution that includes spam, malware, and phishing detection; email attachment analysis; email encryption; and safe file transfer.

  • Encryption: A process that protects data by converting it into a code, which can be decrypted by authorized systems or personnel.

  • Predictive Analytics: Solutions that use machine learning or behavior detection to recognize anomalies; can be beneficial in stopping zero-day attacks.

Also, remember that your employees’ personal devices, when connected to your network, also pose a risk. Establish a BYOD policy and implement solutions that allow you to secure data, control activity on your network, and lock/wipe lost or stolen devices.


Endpoint Protection Best Practices

Implementing the right security solution is only a part of the battle. Effective endpoint protection also requires that you establish and enforce best practices to keep your network safe, such as:

Multi-Factor Authentication

Systems that only require a username and password for access are not the most secure. If a member of your team is victimized by a social engineering attack, hackers could have everything they need to access your network. Also, some people use weak passwords (“password” or “123456”), which hackers can easily guess. Using multi-factor authentication, such as text codes, fingerprint ID, and other biometrics - in addition to a username and password - can ensure that if a hacker gets login credentials that they still can’t access your systems and data.


Secure Every Potential Access Point to Your Network

Your security strategy should include identifying and securing all potential entry points, including third-party systems. The hackers who pulled off the Target breach in 2014, for example, used login credentials from an HVAC company.


Maintain & Update Systems

Software, firmware, patches: Enlisting an experienced solution provider can ensure your systems are well maintained and test security patches in advance so you won’t experience issues or downtime. They can also check your systems to confirm they align with basic system hygiene, such as uninstalling software you don’t need and disabling ports you aren’t using.


Educate Your Team

How your employees use your network can have a major impact on security. Set and enforce rules for acceptable use, detailing what employees can and can’t do, including blacklisting risky applications and websites. Also, make your team aware that information they post on social media or other public sites could be used against your business in a social engineering campaign.


Role-Based Permissions

It’s smart to follow the Principle of Least Privilege. People should only have access to the applications and data they need to do their jobs, and no more. It’s not a restrictive or punitive measure — it limits how much information a hacker can steal if credentials are stolen. Not everyone in your organization needs administrative privileges.


Vulnerability Assessments

Security best practices include periodic assessments by experienced professionals to evaluate your system for new vulnerabilities as your company grows and expands your network and its functionality and as the threat landscape changes.


Is Endpoint Protection More Than You Can Manage?

The threat landscape is always changing, so your endpoint protection strategy must also include a way to keep security solutions up-to-date and able to respond to new attacks. For many businesses, it’s difficult, if not impossible, to find and afford a full-time IT security professional on staff. Endpoint protection is more than a single employee can manage part-time. Subsequently, organizations that understand the threat landscape and their need for a comprehensive security strategy are choosing to outsource endpoint protection to consultants with teams of experts working around the clock.

Attackers and schemes are continually becoming more and more sophisticated. With new avenues of attack emerging daily, there isn’t a 100 percent guarantee that a hacker won’t find a way to access your network. However, with a multilayered security solution, best practices, and expert oversight, you can minimize attacks. It’s all about detecting and stopping malicious activity before attackers can access data and damage your business.

With the high rate of attacks and the cost of data breaches, your business can afford nothing less than the best possible endpoint protection. Not sure where to start? Click the button below and we’ll show you.

Rama Polefka