
![]() |
PDF Document Download Document: Securing the Endpoints: The 10 Most Common Internal ...You must be a logged in to view this document.
|
![]() Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology! |

Excerpt: A recent buzzword in security is endpoint: any device that can connect to the corporate network, ranging from a desktop workstation to a laptop, PDA or even cell phone. As the number of endpoints increases, firewalls and antivirus software are no longer adequate projection. New tactics by criminals and new kinds of malware are probing networks for vulnerabilities. And increasingly, they are finding them. In any attack, the first step is to get inside the organization's security perimeter. Traditionally, that has been done through an external threat, such as an infected e-mail message. Although there are still plenty of virus-laden e-mails, they are becoming less effective as attack vectors. An increasing number of attacks are attempting to bypass the firewall and antivirus programs by coming at the corporation from unsecured angles. While external threats are as virulent as ever and need to be guarded against with firewalls and other defenses, it is more important to pay attention to internal weaknesses.
The solution is to make nuanced policies rather than flat prohibitions. Once you have policies, the next thing to do is plug the obvious security holes. Then, publicize your use policies and monitor your network to make sure the policies are being followed. |