Five Reasons to Reevaluate Your Endpoint Protection

By : Oleg Mogilevsky | Tuesday, November 10 2020 - 11:00 IWST

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)
Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin) - The last few months have changed the way we work. With the instant shift to a fully remote or hybrid workforce, protecting endpoints became a major pain point for many security leaders. Surges in using personal devices to access corporate infrastructure and sensitive data have instantly expanded the attack surface. Cybercriminals are taking advantage of these security gaps in order to gain entrance to enterprise resources.

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations recognise their existing challenges.

1. Ransomware is on the rise

Ransomware attacks that are aimed to seize control, halt business operations or threaten public release of sensitive data are growing in scale and intensity. According to Check Point Research, he United States saw a doubling of ransomware attacks over the last three months. Claiming a new victim every 10 seconds, ransomware is a lucrative attack method for cybercriminals.

In some cases, organisations simply prefer to pay the price instead of dealing with encrypted files and recovering their IT systems. This creates a vicious cycle – the more these type of attacks “succeed” the more frequently they occur.

2. Visibility compromised

With the advent of remote work in the wake of COVID-19, swift registering and further monitoring of every new device is beyond challenging. Any unmonitored device becomes a potential entry point for malicious lateral movements through the network, planting sophisticated malware, or executing abovementioned ransomware attacks.

Obtaining complete real-time visibility is essential, as it is a significant enabler in allowing security teams to prevent threats with no grey zones in the infrastructure.

3. Noise and disruption are no longer acceptable

As attacks scale and evolve, the inability to have an informed judgment on the risk and threat criticality is a recipe for disaster. Simultaneous and often unverified alerts coming from various solutions may paralyse your security teams’ performance at the time when swift action is crucial.

Only endpoint solutions with multiple levels of analysis, AI-driven predictive capabilities and real-time access to global intelligence feeds can quickly verify, analyse, provide context and prioritise alerts in order to focus on those that really matter.

4. Incautious behaviour of your employees

Newly created gaps in the IT systems, along with the widening range of malicious COVID-19-themed messages, attachments, and documents became the immediate evidence to how damaging employees’ lack of awareness is.

Understanding and preventing these risks along with gradual user education and knowledge sharing – can be a solution. The issue is – it takes time and security leaders have none, aiming to retain complete protection and fulfil a compliance mandate.

5. Conventional approach doesn’t cut it

IDC’s latest “IT Endpoint Security Survey” results[1] indicate that only in 30% of cases, security leaders name endpoint device security as a significant component for the organisation’s overall cybersecurity strategy. Another research by Ponemon[2] stated that 51% of respondents said their organisations’ endpoint security solutions are not effective at detecting advanced attacks.

In other words, overlooking endpoint security nor taking an immediate, tactical approach no longer works. Taking a fresh, strategic look at protecting your endpoints and remote workforce will help stay ahead of potential incidents and minimise any potential impact.

What now?

The answer is quite clear: “Hope for the best, and prepare for the worst”. Security leaders are recognising the challenge they face. It’s now time to understand how to reevaluate your endpoint security to have all critical capabilities in place while lowering the TCO.

News Comment

Today's Industry

Ilustration Hackers (Photo by

Jumat, 30 Oktober 2020 - 11:20 WIB

Organisations Paid Hackers US$23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities.

Clean Earth Technologies (CET)

Jumat, 30 Oktober 2020 - 10:30 WIB

Clean Earth Technologies’ New Class Of Polymers Invented By Associate Professor, Justin Chalker, Receives Australian Pm’s New Innovator Award

Associate Professor Justin Chalker has invented a novel class of polymers synthesised directly from elemental sulphur which is a waste by-product of the petrochemical industry and renewable…

SMILE to Empower Smallholders

Kamis, 29 Oktober 2020 - 08:35 WIB

Kao Corporation, Apical & Asian Agri Join Hands to Empower Smallholders with SMILE Program

SMILE or the SMallholder Inclusion for better Livelihood & Empowerment program to help independent oil palm smallholders in Indonesia improve their yields, acquire international certification,…

Industrial Area Ilustration

Rabu, 28 Oktober 2020 - 08:40 WIB

CFLD Develop a Strategic Industrial Area which is Supported by Seven New Infrastructures

Segye ASEAN Forum 2020 which is a series of Indonesian and Korean Manufacturing Industry Partnership forum events held, was attended virtually by more than 500 executives from well-known manufacturing…

Hilton – Asia Pacific (Photo by Hilton Asia Pacific - Posts | Facebook)

Selasa, 27 Oktober 2020 - 15:40 WIB

Waldorf Astoria to Debut in Japan with Milestone Signing In Tokyo

Set to open in 2026, Waldorf Astoria Tokyo Nihonbashi to Offer Timeless Luxury and Unrivaled Service in Japan’s Cultural Capital.