Why MSPs Need to Vigilantly Monitor Endpoint Security in 2016

  • 0_1452091447760_Why_MSPs_Need_to_Vigilantly_Monitor_Endpoint_Security_in_2016.jpg

    See the full blog at: Continuum's MSP Blog

    With the Consumer Technology Association's CES 2016 conference kicking off today, I can't help but think of how many new gadgets, or endpoints, will be unveiled at the event by week's end. Endpoint management is becoming increasingly challenging due to the growing number of personal devices, as well as the growing number of places where a connected device can be found.

    Not too long ago, I wrote a post on my own blog about IoT (Internet of Things). When taking a quick inventory, I was a little stunned to realize I actually carry six connected devices on my person each and every work day! Counting Bluetooth, Wi-Fi, and 3G/LTE devices, I have a laptop, smart pen, fitness watch, iPhone, iPad, Kindle and occasionally a USB stick. While these all bring enjoyment and productivity to my life, if not properly managed, they could also leave the security of my personal data and company's data seriously vulnerable. Considering how highly connected to the Internet we've become at home through TVs, thermostats or even Wi-Fi enabled refrigerators, it should make you and your clients wonder: how much of our data could we be potentially and unknowingly putting at risk?

    Need-to-Know Statistics on Endpoint Security

    Here is an excerpt of relevant findings from an independent endpoint security study done by the Ponemon Institute from 2015:

    "Mobile devices, such as smart phones, have seen the greatest rise in potential IT security risk in the IT environment. Eighty percent of respondents say smart phones are a concern followed by vulnerabilities in third party applications (69 percent), mobile remote employees (42 percent) and the negligent insider risk. Governance and control processes are the biggest gaps in stopping attacks on endpoints. On average, 28 percent of attacks on an organization’s endpoints cannot be realistically stopped with enabling technologies, processes and in-house expertise. Seventy percent of respondents agree that their organizations’ endpoint security policies are difficult to enforce."

    • Ponemon Institute Research 2015 State of the Endpoint Report: User-Centric Risk

    Also, of the growing number of mobile attacks, a Webroot study found that 38.7 percent of attacks are SMS malware, 39.8 percent are Ad-SDK PUAs (potentially unwanted applications) and 8.9 percent are malware using obfuscation (malware hidden deep in an application's code).

    • Webroot Mobile Threat Report 2014

    How to Help Eliminate Anxieties about Endpoint Security

    Thankfully, MSPs can reduce the data security risk described by setting and overseeing an AUP (Acceptable Use Policy). Start by applying an AUP that requires strong passwords on company issued laptops or company connected mobile devices. Clearly establishing what's expected of your employees when using a personal device for work and enforcing that protocol is critical, especially with the ongoing trend of BYOD (Bring Your Own Device)... Keep Reading!