Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/31/2019
10:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Focusing on Endpoints: 5 Steps to Fight Cybercrime

Follow these best practices to strengthen endpoint management strategies and protect company data.

Cyberattacks are increasing across industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities is decreasing, the number considered to be critical is on the rise — and so are the number of actual security exploits. Businesses are at risk of disruption, incurring devastating financial and reputational damage. With increasingly complex endpoints, IT teams find themselves racing to keep up with securing the proliferation of smartphones, tablets, and other devices.

Bring-your-own-device (BYOD) programs and Internet of Things (IoT) technologies further complicate the process because each device that connects to your network increases your vulnerability to threats from malware and viruses. Many devices accessing corporate data are mobile, making remote, hands-off management a necessity. Having an endpoint security strategy that gives clear visibility into all devices at all times is absolutely essential and can be the difference between smooth IT sailing or a security breach that has a significant impact on the business.

Here are five steps that can strengthen endpoint management strategies and empower organizations to fight back against cybercrime and protect sensitive company data.

1. Automate inventory management and deploy antivirus software.
Visibility into inventory management is key. If you don't know what you have on your network, how can you manage it? Visibility is increasingly critical as BYOD programs become more pervasive and IoT devices flood the network. Having visibility enables IT to know where physical assets are and enables automated processes to secure the network and ensure fewer (and in many cases, eliminate) vulnerable access points for would-be hackers.

Once visibility into the network is established, IT administrators can also identify which systems need antivirus software. Many devices lack basic security and antivirus software, and as more and new devices are added to the network, it is critical that each device has its own protection to protect against attackers.

2. Automate patch management.
Patches and software updates are constantly being released — and unfortunately, many users delay installing updates until it's too late. By automating patch management, IT can ensure both Windows and Mac platforms, as well as potentially vulnerable third-party applications like Adobe Reader and Oracle Java, receive patch updates in a timely manner and keep devices up to date. Coupled with IT security audits, automated patch management helps IT more quickly discover potential vulnerabilities and identify systems that are not compliant with security and configuration policies.

3. React quickly when you suspect an endpoint infection.
If you suspect that an endpoint is infected with a virus, don't take any chances: immediately re-image the device. Once a device has been compromised, trying to repair the issue can be time consuming and error prone — and does not provide good confidence that the issue won't recur. Manual operating system deployment processes can deter IT from taking the appropriate steps needed to secure endpoints, but investing the time to automate these processes can save a lot of time and headaches later. Automated imaging solutions can also provide an easy way to facilitate updates and ultimately help keep a network secure, especially across a distributed workforce.

4. Make sure you can track and manage mobile assets remotely.
A proven way to simplify mobile endpoint management is to implement tracking and management software. Many IT teams may have basic functionality in place, but it's critical to be able to identify all devices on a network and send specific commands to mobile devices, if needed, to keep them secure. While having visibility is helpful, IT teams also must be able to act in order to safeguard important data. For example, IT must be able to lock a mobile device and wipe its data if it goes missing. Other critical mobile endpoint management capabilities include remote inventory, device unlock, passcode reset, and factory reset.

5. Ensure the appropriate user access rights.
To avoid security breaches, it's critical that users have the correct level of access to systems that contain sensitive corporate data. IT teams must be able to easily keep track of which systems specific users can and are accessing. By default, users might get least-privilege rights — and other times, they might have administrator rights. Make sure you know what type of access rights each user has to prevent unauthorized users who can unintentionally spread malware and compromise data from accessing sensitive data.

By following these endpoint management best practices, IT teams can bolster the safety and security of their data and minimize the number of vulnerable access points across the network. Keeping ahead of attacks means staying current on endpoint strategies and simplifying what can at times make for complex endpoints. To best protect the business, we must make sure we're empowering IT departments to fend off attackers and be ready to react swiftly with the best tools available.

Related Content:

Matthew Lewinski has been developing endpoint management solutions for over 14 years. He is currently a Distinguished Engineer with Quest Software, where he leads DevOps and Security programs for the KACE Unified Endpoint Management business. Matthew has an M.S. in Software ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
6/3/2019 | 3:42:23 PM
For Mr. Roberts1161
Off subject for Mr. Roberts posting name - I remember a television scene of the US Navy Choir on a stage singing and hosted by Henry Fonda.  When done, one by one, the sailors walked down the small bleacher and said " Good night Mr. Roberts" to Fonda as they passed him left and right.  He almost broke down.  Incredible to see. 

 
mroberts1161
100%
0%
mroberts1161,
User Rank: Strategist
6/3/2019 | 7:45:35 AM
Focusing on Endpoints: 5 Steps to Fight Cybercrime
Great basics provided with any decent endpoint vendor dashboard. Good example is McAfee EPO. I would add a couple of things keeping in mind - Obviously there is no such thing as a 100% secure endpoint and the other well-known fact is more security slows down creativity and production.

1. Once a compromise is alerted remove the device from the network then re-image. Re-image is the cheapest most accurate way to avoid residuals. Scanning and cleaning cannot always catch everything.

2. Have a policy written up with the step by step procedures including a log of the alerts with the actual compromise listed and actions taken. This will show any recurring symptoms or false positives.

3. It is advisable to limit the ability to install new external software at an endpoint without admin rights. Set up an easy policy to some type of ticketed request for temporary rights, thus an audit is created, and shadow IT is controlled.

4. DLP is usually part of a good vendor product which should assist with unauthorized USB or other devices.

5. DMARC EMAIL policies, procedures, benchmark/train/retest should help with phishing.

6. Proxy whitelist or blacklist to assist controlling things like rootkits.

 

 
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
6/1/2019 | 6:50:13 PM
Specifically Block/Control Internet Access
For some reason one area that is continuously overlooked or under-managed is Internet access from the company network.  For example, an organization I am familiar with only recently started locking their company laptops from use of USB devices.  However, from these same laptops users can access cloud drives, download and upload files without warnings or security hurdles.  In other words, whatever the intent of the USB block, all that energy was wasted by access being provided to the Internet for WAN and LAN users.

In contrast, a past company of mine that developed financial software blocked all Internet access by default, prevented USB access to all systems by use of physical system locks and protected all their Ethernet ports with similar locks.  Emails were filtered on a level of paranoia and no attachments were allowed incoming or outgoing.  A document control system that was only accessible on the LAN (no VPN access) was exclusively used for exchange of documents, and all the code bases were accessed from secured local servers serving up Git to onsite developers.

Obviously the comment here is going to be that many companies are hybrids with local offices and also remote offices and contractors.  Some companies don't even have physical offices.  This could point to why many organizations like the one who spent so much time securing USB port might overlook the existence of Google Drive and MEGA being just a URL away.  It also begs the question whether convenience and the modern expectation of immediate response might be one of our biggest Information Security setbacks...

 

 
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
Capital One Breach: What Security Teams Can Do Now
Dr. Richard Gold, Head of Security Engineering at Digital Shadows,  8/23/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15540
PUBLISHED: 2019-08-25
filters/filter-cso/filter-stream.c in the CSO filter in libMirage 3.2.2 in CDemu does not validate the part size, triggering a heap-based buffer overflow that can lead to root access by a local Linux user.
CVE-2019-15538
PUBLISHED: 2019-08-25
An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a ...
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.