Enterprises Are At Significant Risk From Common Endpoint Device Security Gaps

Security threats are coming from all fronts – both offline and online. Unreliable websites are great contributors for malwares. Network endpoints are the main sources of threats on the offline side.

In an effort to help IT departments evaluate and better secure their network endpoints, such as desktops, notebooks, smart phones, MP3 players and thumb drives, Novell announced initial results from its Threat Assessment survey which show that many enterprises are still highly vulnerable to preventable security threats.

To date, the survey has revealed significant vulnerabilities, particularly in the areas of inadequate data protection, insufficient mobile access policies, and lack of application control and system integrity for endpoint devices.

Inadequate Data Protection

– 71 percent of companies said they do not encrypt data on laptops, while 73 percent of companies do not encrypt data on removable storage devices, exposing the company to significant risk if these devices are lost or stolen.

– 72 percent of respondents said they do not control the data that is copied to removable storage devices or optical writers, and 78 percent do not report what data is written to removable storage devices, creating the potential for inappropriate data distribution and compliance issues.

Insufficient Mobile Access Policies

– 90 percent of respondents said their end users access open, non-secured wireless networks when outside of the office (i.e. hotspots, hotels, coffee shops), leaving endpoints and data vulnerable to attacks.

– 76 percent of companies said that they cannot ensure system health, integrity, and compliance of their endpoint devices when they go beyond the perimeters of the organization.

Lack of Application Control and System Integrity

– 53 percent of respondents are not able to prevent peer-to-peer traffic like Bit Torrent and Gnutella from accessing their networks, thereby draining precious IT resources and creating risk that corporate data will be accessed.

– 65 percent of respondents were unable to prevent user from accessing the corporate network if the user lacked system integrity verification tools, such as anti-virus software. Further, 73 percent could not stop an out-of-compliance endpoint from propagating infections or becoming infected.

Based on the results of its Threat Assessment survey, Novell identifies the three best practices for endpoint security as data protection, mobile access control and system health.

– First, organizations should simplify their endpoint security needs and reduce IT costs by combining point security solutions under a single management console.

– Second, IT administrators should secure their mobile endpoints and protect their data with IT solutions that control removable media, storage or Wi-Fi enabled devices while maintaining system integrity 24/7 whether endpoints are connected to the network or not.

– Third, employing network access control technology can help an organization prevent security threats from entering the network and contaminating other devices without stifling business.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: