• No results found

How Endpoint Security Is Central to Data Integrity

N/A
N/A
Protected

Academic year: 2021

Share "How Endpoint Security Is Central to Data Integrity"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

1.877.225.4264  | 770 Palladium Drive, Ottawa, ON, K2V 1C8

www.calian.com

How Endpoint

Security Is

Central to

Data Integrity

1

For cybercriminals, endpoints—with their accessible and very large attack surface—are nothing but an easy target

(2)

You’re between a rock and a hard place. On the one hand, you need to allow your users flexible access to devices; on the other hand, you need to ensure the security of sensitive data. For many companies, it’s a continual struggle to make sure endpoints aren’t vulnerable and at risk. And the situation is going to get worse.

According to Intel, there will be over  200 billion connected devices by 2020. Imagine the vulnerability of your sensitive data to a cyberattack. And it’s just a matter of time when you consider these statistics:

• Since 2013, there have been 3,809,448 records stolen through breaches every day—that’s 158,727 per hour, 2,645 per minute, and 44 every second of every day.

• In 2018, we witnessed some of the biggest personal data breaches in history—Marriott, Exactis, and Facebook, among many others, were the target.

• In 2019, cybercrime will cost businesses over US$2 trillion.

• In 2020, the average cost of a data breach will exceed US$150 million as more business infrastructure gets connected (Brooks, n.d.).

Taking into account that data is the one consistent thread that binds endpoints together, it makes sense for your company to take a data-centric approach to security—regardless of financial, technological, or other constraints.

When you think about it, it’s critical, as you’re facing numerous and evolving cyberthreats every single day—approximately one million cyberattacks are attempted every day—and the costs of a breach are astronomical.

(3)

1.877.225.4264  | 770 Palladium Drive, Ottawa, ON, K2V 1C8

www.calian.com

You continually evolve your security solutions to meet the increasing threats to your business. Unfortunately, cybercriminals also continually evolve their types of attack to overcome your defenses and breach your organization. It’s a never-ending battle. And it’s not going away.

Malware and malicious  insider-related cyberattacks jumped 12%  in 2018, accounting for one-third of all cyberattack costs. On average, the cost of malware to companies increased 11% to more than US$2.6  million per company. Malicious insiders—employees, temporary staff, contractors, and business partners—jumped 15%, costing each company an average of US$1.6  million (Ponemon Institute and Accenture, 2019).

You also have to take into account the hidden costs that can threaten the survival of your company: negative impact on reputation, reduced productivity as your employees focus on recovery, loss of trust by customers and stakeholders, and non-compliance with mandatory regulations, resulting in heavy fines and other penalties. The threat to business today isn’t so much your competition, it’s your ability to survive in a climate of accelerating cyber risks. You just have to look at the cybercrime statistics in 2018.

Financial

Loss and

Hidden

Costs

3

(4)

being taken and no malicious code is being introduced into your network?

The solution is to move to a data-centric security approach, one  that secures the  data  itself rather than networks, servers, or applications. You protect the data—not the system where your data resides. When you protect the system only, the data is left unprotected when it is moved elsewhere—leaving your customers’ data exposed and vulnerable to a vicious cyberattack.

The first step is to have sensitive data automatically identified as soon as it enters your IT ecosystem. Then, secure it with a policy-based protection system, one that stays with the data throughout its life  cycle. A common practice is to install software agents on every IT asset where sensitive data resides; for instance, laptops, servers, and mobile devices. Administrators control these agents from a centralized management console, applying the right type of protection for each data type and use case.

At this point, when the data is either created or modified, the system scans the file to see if it contains sensitive information, then automatically applies the appropriate security. This protected data is only available to authorized users; unauthorized users have no access. When you implement a data-centric security solution throughout your organization, you reduce or eliminate the impact on data—even if your network or device security fails.

This is just a brief overview. When you implement such an approach to security, your users gain the amount of control they need with a level of security that effectively prevents a cyberattack because the data is always protected—regardless where it resides. To accomplish this, you need to combine user awareness, cybersecurity training, and next-generation antivirus and data protection to generate the multifaceted solutions that are essential for protecting your endpoints from current and future cyberattacks.

And think about this: When you’ve implemented such multifaceted solutions, you’ll no longer be between a rock and a hard place.

(5)

Contact us for a free consultation or to receive a FREE

cloud security audit to assess the effectiveness of

your current cybersecurity initiatives.

1.877.225.4264  | 770 Palladium Drive, Ottawa, ON, K2V 1C8

References

Brooks, C. (n.d.). Keep calm and… Here is a list of alarming cybersecurity statistics. Retrieved from https:// itspmagazine.com/from-the-newsroom/keep-calm-and-here-is-a-list-of-alarming-cybersecurity-statistics

Ponemon Institute LLC and Accenture (2019). The cost of cybercrime. Ninth annual cost of cybercrime study: Unlocking the

value of improved cybersecurity protection. Retrieved from https://www.accenture.com/_acnmedia/PDF-96/

Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf

Sheridan, Kelly (2019, February 4). Exposed consumer data skyrocketed 126% in 2018. Retrieved from https:// www.darkreading.com/attacks-breaches/exposed-consumer-data-skyrocketed-126--in-2018/d/d-id/1333790

www.calian.com

5

1.877.225.4264

References

Related documents

As stated earlier, this thesis concentrates on the environmental policies and strategies of some major companies, that is corporate environmental responsibility (CER); the drivers

To ensure that Windows Update is turned on when computers are connected to your network, you can use the network access control features in Sophos Endpoint Security and

En efecto, así como los libertarianos ven en cual- quier forma de intervención del Estado una fuente inevitable de interferencias arbitrarias –con la excepción de aquella acción

A statistically significant negative correlation was dem- onstrated in the study cohort between the maternal serum PIGF levels, foetal heart rate (FHR), birth weight and length,

Data Security - Both cloud and on-premise deployment models offer the security you need for your business Data Access - When you choose a well-known and respected cloud provider,

With endpoint security at the core of security strategies, organizations are able to remotely delete data and physically recover stolen computers in the event that other

[r]

This thesis is about using exact optimization algorithms to solve the routing problem known as the Mixed Capacitated General Routing Problem (MCGRP) that is a generalization of