Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/31/2019
10:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Focusing on Endpoints: 5 Steps to Fight Cybercrime

Follow these best practices to strengthen endpoint management strategies and protect company data.

Cyberattacks are increasing across industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities is decreasing, the number considered to be critical is on the rise — and so are the number of actual security exploits. Businesses are at risk of disruption, incurring devastating financial and reputational damage. With increasingly complex endpoints, IT teams find themselves racing to keep up with securing the proliferation of smartphones, tablets, and other devices.

Bring-your-own-device (BYOD) programs and Internet of Things (IoT) technologies further complicate the process because each device that connects to your network increases your vulnerability to threats from malware and viruses. Many devices accessing corporate data are mobile, making remote, hands-off management a necessity. Having an endpoint security strategy that gives clear visibility into all devices at all times is absolutely essential and can be the difference between smooth IT sailing or a security breach that has a significant impact on the business.

Here are five steps that can strengthen endpoint management strategies and empower organizations to fight back against cybercrime and protect sensitive company data.

1. Automate inventory management and deploy antivirus software.
Visibility into inventory management is key. If you don't know what you have on your network, how can you manage it? Visibility is increasingly critical as BYOD programs become more pervasive and IoT devices flood the network. Having visibility enables IT to know where physical assets are and enables automated processes to secure the network and ensure fewer (and in many cases, eliminate) vulnerable access points for would-be hackers.

Once visibility into the network is established, IT administrators can also identify which systems need antivirus software. Many devices lack basic security and antivirus software, and as more and new devices are added to the network, it is critical that each device has its own protection to protect against attackers.

2. Automate patch management.
Patches and software updates are constantly being released — and unfortunately, many users delay installing updates until it's too late. By automating patch management, IT can ensure both Windows and Mac platforms, as well as potentially vulnerable third-party applications like Adobe Reader and Oracle Java, receive patch updates in a timely manner and keep devices up to date. Coupled with IT security audits, automated patch management helps IT more quickly discover potential vulnerabilities and identify systems that are not compliant with security and configuration policies.

3. React quickly when you suspect an endpoint infection.
If you suspect that an endpoint is infected with a virus, don't take any chances: immediately re-image the device. Once a device has been compromised, trying to repair the issue can be time consuming and error prone — and does not provide good confidence that the issue won't recur. Manual operating system deployment processes can deter IT from taking the appropriate steps needed to secure endpoints, but investing the time to automate these processes can save a lot of time and headaches later. Automated imaging solutions can also provide an easy way to facilitate updates and ultimately help keep a network secure, especially across a distributed workforce.

4. Make sure you can track and manage mobile assets remotely.
A proven way to simplify mobile endpoint management is to implement tracking and management software. Many IT teams may have basic functionality in place, but it's critical to be able to identify all devices on a network and send specific commands to mobile devices, if needed, to keep them secure. While having visibility is helpful, IT teams also must be able to act in order to safeguard important data. For example, IT must be able to lock a mobile device and wipe its data if it goes missing. Other critical mobile endpoint management capabilities include remote inventory, device unlock, passcode reset, and factory reset.

5. Ensure the appropriate user access rights.
To avoid security breaches, it's critical that users have the correct level of access to systems that contain sensitive corporate data. IT teams must be able to easily keep track of which systems specific users can and are accessing. By default, users might get least-privilege rights — and other times, they might have administrator rights. Make sure you know what type of access rights each user has to prevent unauthorized users who can unintentionally spread malware and compromise data from accessing sensitive data.

By following these endpoint management best practices, IT teams can bolster the safety and security of their data and minimize the number of vulnerable access points across the network. Keeping ahead of attacks means staying current on endpoint strategies and simplifying what can at times make for complex endpoints. To best protect the business, we must make sure we're empowering IT departments to fend off attackers and be ready to react swiftly with the best tools available.

Related Content:

Matthew Lewinski has been developing endpoint management solutions for over 14 years. He is currently a Distinguished Engineer with Quest Software, where he leads DevOps and Security programs for the KACE Unified Endpoint Management business. Matthew has an M.S. in Software ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
6/3/2019 | 3:42:23 PM
For Mr. Roberts1161
Off subject for Mr. Roberts posting name - I remember a television scene of the US Navy Choir on a stage singing and hosted by Henry Fonda.  When done, one by one, the sailors walked down the small bleacher and said " Good night Mr. Roberts" to Fonda as they passed him left and right.  He almost broke down.  Incredible to see. 

 
mroberts1161
100%
0%
mroberts1161,
User Rank: Strategist
6/3/2019 | 7:45:35 AM
Focusing on Endpoints: 5 Steps to Fight Cybercrime
Great basics provided with any decent endpoint vendor dashboard. Good example is McAfee EPO. I would add a couple of things keeping in mind - Obviously there is no such thing as a 100% secure endpoint and the other well-known fact is more security slows down creativity and production.

1. Once a compromise is alerted remove the device from the network then re-image. Re-image is the cheapest most accurate way to avoid residuals. Scanning and cleaning cannot always catch everything.

2. Have a policy written up with the step by step procedures including a log of the alerts with the actual compromise listed and actions taken. This will show any recurring symptoms or false positives.

3. It is advisable to limit the ability to install new external software at an endpoint without admin rights. Set up an easy policy to some type of ticketed request for temporary rights, thus an audit is created, and shadow IT is controlled.

4. DLP is usually part of a good vendor product which should assist with unauthorized USB or other devices.

5. DMARC EMAIL policies, procedures, benchmark/train/retest should help with phishing.

6. Proxy whitelist or blacklist to assist controlling things like rootkits.

 

 
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
6/1/2019 | 6:50:13 PM
Specifically Block/Control Internet Access
For some reason one area that is continuously overlooked or under-managed is Internet access from the company network.  For example, an organization I am familiar with only recently started locking their company laptops from use of USB devices.  However, from these same laptops users can access cloud drives, download and upload files without warnings or security hurdles.  In other words, whatever the intent of the USB block, all that energy was wasted by access being provided to the Internet for WAN and LAN users.

In contrast, a past company of mine that developed financial software blocked all Internet access by default, prevented USB access to all systems by use of physical system locks and protected all their Ethernet ports with similar locks.  Emails were filtered on a level of paranoia and no attachments were allowed incoming or outgoing.  A document control system that was only accessible on the LAN (no VPN access) was exclusively used for exchange of documents, and all the code bases were accessed from secured local servers serving up Git to onsite developers.

Obviously the comment here is going to be that many companies are hybrids with local offices and also remote offices and contractors.  Some companies don't even have physical offices.  This could point to why many organizations like the one who spent so much time securing USB port might overlook the existence of Google Drive and MEGA being just a URL away.  It also begs the question whether convenience and the modern expectation of immediate response might be one of our biggest Information Security setbacks...

 

 
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4652
PUBLISHED: 2019-11-12
IBM Spectrum Protect Plus 10.1.0 through 10.1.4 uses insecure file permissions on restored files and directories in Windows which could allow a local user to obtain sensitive information or perform unauthorized actions. IBM X-Force ID: 170963.
CVE-2011-3618
PUBLISHED: 2019-11-12
atop: symlink attack possible due to insecure tempfile handling
CVE-2012-1109
PUBLISHED: 2019-11-12
mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions
CVE-2019-18848
PUBLISHED: 2019-11-12
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
CVE-2011-5271
PUBLISHED: 2019-11-12
Pacemaker before 1.1.6 configure script creates temporary files insecurely