Guys, News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet we all face similar risks in the everyday acts of using digital technology and the internet for various purposes.
Risky business: Where you need more than anti-virus
- The zero-day threat
Zero-day threats can also exploit zero-day vulnerabilities, or previously unknown security deficiencies that software vendors have not yet patched.
- Working outside the firewall
Using an unsecured network is risky. The Conficker worm mostly spread using vulnerable networks. Add location-aware client firewall software on laptops and other endpoint PCs. A location-aware firewall enforces tighter security when the user is connected to any non-trusted network.
- The unpatched PC
You probably notice how often your network pushes security updates to your laptop or PC. There is a good reason for the frequent updates: One small unpatched vulnerability in an application, browser or operating system can lead to huge problems.
- The uncontrolled application
Letting unmanaged applications access the web brings unacceptable risk or performance issues. Security professionals use the term “potentially unwanted applications” (PUAs) to describe instant messaging (IM), social networking sites, peer-to-peer (P2P) clients, voice over IP (VoIP) and games. Such applications increase the “surface area” that is vulnerable to attacks.
- Web insecurity
Criminals abuse the web as their single biggest distribution point for malware. Legitimate websites are productive targets because visitors trust them.
- The lost laptop
It’s not that difficult to replace any of the thousands of laptops that are lost or stolen every year. The hard part is recovering the exposed information on those computers
One simple slip of the fingertip—in an instant, your document goes to the wrong email address. Such a slim margin of error is unacceptable when confidential data could leak
- The infected USB device
Every time users plug a USB device into a company computer, they bypass other layers of defense such as gateway firewall protection. That makes devices with USB ports an easy means of attack. If no protection is active on the endpoint system, the door swings open to malware
|THREAT||RISK||END POINT SECURITY|
|The zero-day threat |
|Unknown or new vulnerability||• Suspicious file and behavior detection |
• Live anti-virus with online, real-time lookups
|Working outside the firewall||Using an unsecured network||• Location-aware client firewall |
• Suspicious file and behavior detection
• Software patches
|The unpatched PC||Intrusions and breaches, including incidents that result in non-compliance with regulations||• Network access control (NAC) |
• Data encryption
• Content scanning with data loss prevention
• Application controlv
|The uncontrolled application||Applications with questionable security||Application control|
|Web insecurity||SEO poisoning and drive-by attacks||• URL filtering |
• Malware scanning
|The lost laptop||Data exposure when a laptop is misplaced or stolen||Data encryption|
|The misdirected email||Unwanted accidents potential threat to your organization||use data loss prevention software to scan for sensitive content|
|The infected USB device||fast-spreading worm attack|
Save Data…Say no to Threats and Thefts!