dcsimg

How to Battle Summer Complacency in Endpoint Security

  • How to Battle Summer Complacency in Endpoint Security-

    Your users might be sharing a lot more than photos of their trip to Bora Bora. When you’ve recovered from seeing colleagues in their beach attire, take a look at what else they’re sharing, particularly on their local networks. A recent cringe-worthy example: an HR administrator didn’t realize the state of open share settings on folders containing staffing structures, resignation letters, salary information, and sensitive financial data/projections until it was discovered by a now-disgruntled employee. Assess the open share settings on sensitive content, and prevent problems before they start this fall.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

How to Battle Summer Complacency in Endpoint Security

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • How to Battle Summer Complacency in Endpoint Security-6

    Your users might be sharing a lot more than photos of their trip to Bora Bora. When you’ve recovered from seeing colleagues in their beach attire, take a look at what else they’re sharing, particularly on their local networks. A recent cringe-worthy example: an HR administrator didn’t realize the state of open share settings on folders containing staffing structures, resignation letters, salary information, and sensitive financial data/projections until it was discovered by a now-disgruntled employee. Assess the open share settings on sensitive content, and prevent problems before they start this fall.

As an IT professional, you know that endpoints are where attackers seek to exploit vulnerabilities, commit cyber fraud and conduct other malicious activity. But often, the more lackadaisical summer months can lead to security complacency with staff shortages, long weekends and roaming employees. Just because your company wasn’t the victim of a major breach this past summer doesn’t mean that your endpoints as potential points-of-entry are secure. Now is an ideal time for security professionals to double down on visibility efforts to identify issues that may have arisen during the dog days of summer.

Here are some tips and tricks, identified by Dan Ross, CEO at Promisec, for ensuring your organization is ready to start the fall with an effective strategy for monitoring threats and getting ahead of endpoint vulnerabilities – before you’re the victim of an attack.