Chuck Leaver – The Use Of Endpoints As The Conduit For Widespread Cyber Attacks Is Now On The Rise

From The Desk Of Chuck Leaver CEO Ziften Technologies

With the introduction of bring your own device (BYOD) strategies and cloud computing the securing of particular endpoints has ended up being much harder, as administrators could be making ease of data access a priority over security. The risks exist however, since the majority of the present generation of endpoint security software applications have not been modified to safeguard from aggressive hacking and harmful cyber attack techniques that target specific endpoints as the launch pad for attacks that are commonly distributed.

There was a really well-known endpoint attack that occurred in recent times where a malware family named Comfoo was utilized to compromise the networks of many multinational organizations back in 2010. The Comfoo malware consisted of a number of custom designed backdoor Trojans and exploits that could continuously disperse malware. A more serious consequence was that this malware could cause destructive data leakage by scraping account and network details and monitor all user input, according to CRN contributor Robert Westervelt. It is believed that the Comfoo malware might have been a part of a sophisticated cyber espionage campaign, because of the approach that was used and the evasion of traditional endpoint tracking.

Utilizing e-mail phishing and social engineering the malware had the ability to jeopardize targeted gadgets, which underlines how ripe endpoints have ended up being for malware infestation, so states Jason O’Reilly, security executive. When he was speaking with ITWeb, O’Reilly stated that traditional endpoint software does not sufficiently account for access from locations beyond the IT department most of the time, and it does not restrict data exposure to authorized individuals through using access controls.

O’Reilly mentioned that “endpoint security services need to provide layered security that exceeds signature-based detection only to consist of heuristic-based detection and polymorphic-based detection.” “Today’s networks are exposed to hazards from many different sources.”

Real Time Threat Capturing And Report Creation

The high stakes for control strategies and endpoint security were determined by business consulting firm Frost & Sullivan, as they felt both of these areas were under pressure from both external hackers and the insatiable demand from workers for gadget choice flexibility.

Chris Rodriguez, Frost & Sullivan analyst stated “business IT organizations now face tremendous pressure to allow staff members to access the business network and files from their own personal devices.” “Considering their relatively universal nature, fast data connections, and powerful hardware and operating systems, these gadgets represent prime targets for hackers.”

When asked what organizations can do to tighten up on the distinct weaknesses of mobile hardware, O’Reilly suggested that any solutions need to supply clear and detailed visibility into what is taking place on each endpoint so that action can be taken quickly when any hazards are discovered.