Intelligent CISO Issue 35 | Page 15

latest intelligence

ENDPOINT SECURITY EFFECTIVENESS

HOW ORGANISATIONS PROTECT THEIR ENDPOINTS AGAINST RANSOMWARE AND MALWARE

eEndpoint tipping point

Hear us out : attacks either begin on an endpoint or are headed to one .
Why do we make this argument ? As has been documented with nearly all ransomware , employees and end users are often the easiest way into an enterprise , large or small , via phishing schemes or malspam . Getting just one user in an organisation to open a malicious attachment on their endpoint can be a weak link in your carefully executed security strategy .
At that point , attackers have a foothold on a single laptop , establish persistence , and begin to move laterally – this is how a single infection becomes a full-scale breach .
Least privilege and Zero Trust approaches are global best practices to contain threats . However , the Zero Trust discussion has centered on campus networks , clouds , and data centers – but not yet endpoints , the place where attacks begin .
We wanted to get a sense for how organisations view the effectiveness of their endpoint security , given the disastrous results that can come from ransomware and malware spreading in an enterprise ( more on this to come ).
Illumio teamed up with Virtual Intelligence Briefing ( ViB ), an interactive online community focused on emerging through rapid growth stage technologies . ViB ’ s community is comprised of more than 1.2M IT practitioners and decision makers who share their opinions by engaging in sophisticated surveys across IT domains including information security .
This report sums up our findings , with insights into endpoint security efforts , detection adequacy , and the key gap that needs to be addressed . u
PRESENTED BY
DOWNLOAD WHITEPAPERS AT : WWW . INTELLIGENTCISO . COM /
WHITEPAPERS www . intelligentciso . com
15