![]() ![]() Moreover, 82% of IT security decision-makers had to re-evaluate their security policies in response to work-from-home requirements.Īll this occurs as a decades-long reliance on server-based domain controllers to define the interdomain trust perimeter has proved hackable by bad actors. This trend continues to affect organizations today, as 76% of IT security decision-makers responding to the survey say their organizations’ use of endpoint devices increased since the beginning of the COVID-19 pandemic. The pandemic quickly created a surge in endpoint device demand. Absolute’s study shows how overly complex endpoint controls and out-of-date OS patches put an organization’s most sensitive data at risk. They’re searching for vulnerable corporate networks containing marketable data that can quickly be exfiltrated and sold on the Dark Web. Well-managed endpoints gain increasing importance as bad actors become increasingly skilled at finding security gaps in endpoints and capitalizing on them for financial gain. Endpoints comprise high-priority attack vector Absolute used anonymized data from nearly five million Absolute-enabled endpoint devices active across 13,000 customer organizations in North America and Europe to gain new insights into endpoint risks and manage them. One of the most valuable insights from Absolute Software’s 2021 Endpoint Risk Report is that the most over-configured endpoint devices often can’t identify or manage risks and breaches.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |