Pandemic Drives Greater Need for Endpoint SecurityPandemic Drives Greater Need for Endpoint Security
Endpoint security has changed. Can your security plan keep up?
April 17, 2021
The need to support a mostly remote workforce over the past year, and continued expectation of remote work for the foreseeable future, means endpoint security must be a priority for security teams.
So far, it is an uphill battle, according to the Dark Reading 2021 State of Endpoint Security survey. More than half (57%) of security professionals believe changes to the endpoint environment wrought by the coronavirus pandemic have significantly increased the risk of a major data breach.
The concept of "endpoint security" has evolved significantly for endpoint security managers. How is your enterprise approaching the endpoint security problem? In Battle for the Endpoint, another new Dark Reading report, experts offer advice and recommendations on how to build an endpoint security strategy that works across all devices an end user might employ.
In this report, we talk to practitioners including Tim Rohrbaugh, chief information security officer at JetBlue Airways. Security remained a high priority at JetBlue following the start of the pandemic but securing newly homebound workers meant a rethink on endpoint security.
"Not only are the controls that you put in place [in the office] no longer protecting their systems — because the folks are remote — but now you may not be getting any type of intelligence or visibility into potential misuse," Rohrbaugh says. The bottom line? "If you are not running an EDR and are not able to respond to incidents remotely, then, well, good luck."
Download and read the full report here.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums