ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Securing the Endpoints: The 10 Most Common Internal ...



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

A recent buzzword in security is endpoint: any device that can connect to the corporate network, ranging from a desktop workstation to a laptop, PDA or even cell phone. As the number of endpoints increases, firewalls and antivirus software are no longer adequate projection.

New tactics by criminals and new kinds of malware are probing networks for vulnerabilities. And increasingly, they are finding them.

In any attack, the first step is to get inside the organization's security perimeter. Traditionally, that has been done through an external threat, such as an infected e-mail message. Although there are still plenty of virus-laden e-mails, they are becoming less effective as attack vectors.

An increasing number of attacks are attempting to bypass the firewall and antivirus programs by coming at the corporation from unsecured angles. While external threats are as virulent as ever and need to be guarded against with firewalls and other defenses, it is more important to pay attention to internal weaknesses.
Promisec found 10 major areas of problems:

  • USB Devices
  • Peer-to-Peer File Sharing
  • Antivirus Problems
  • Outdated Microsoft Service Packs
  • Missing Security Agents
  • Unauthorized Remote-Control Software
  • Media Files
  • Unnecessary Modems
  • Unauthorized or Unsecured Synchronization Software
  • Wireless Connectivity

The solution is to make nuanced policies rather than flat prohibitions. Once you have policies, the next thing to do is plug the obvious security holes. Then, publicize your use policies and monitor your network to make sure the policies are being followed.