Page 73 - Cyber Defense eMagazine December 2022 Edition
P. 73

1. ABP = Always Be Patching

            Managing software updates — and specifically patching endpoints — helps secure an organization from
            known  threats.  A  recent  study  showed  that  60%  of  breach  victims  cited  a  known  but  unpatched
            vulnerability, where the patch was available but had not been applied, as the reason for a breach. This
            lack of action often stems from the sheer volume of emerging attacks combined with the large number of
            patches being released across today’s IT ecosystem, and a lack of a comprehensive patching strategy.

            The appearance of new endpoint types, such as Internet of Things (IoT), Bring Your Own Device (BYOD),
            and other operating system and software vulnerabilities, has resulted in a tidal wave of patch releases
            over the last 5 years. Staying ahead of threat actors means patching all the time.



            2. Seek Out All Endpoints

            Think about a company network and how many endpoint devices there are. Hundreds? Thousands?
            Tens  of  thousands?  Endpoint  compromise  accounts  for  most  of  today’s  security  breaches.  In  fact,
            estimates put the number around 70 percent. If you can’t identify and track these devices, how can you
            secure them? The easiest way to do so is with a comprehensive discovery and configuration compliance
            audit. This process can have multiple steps, but it typically involves:

               •  Discovering and taking a thorough inventory of all hardware, such as servers, laptops, virtual
                   machines, mobile and networking devices.
               •  Ensuring all systems are configured in line with applicable compliance standards and internal
                   security policies.
               •  Continuously monitoring those configurations for inappropriate or unwanted changes and
                   mitigating configuration drift.


            Ensuring you have a running tally of your endpoints is critical to securing them.



            3. Stay Current on Innovations

            Hackers and threat actors are constantly upgrading their technology and approaches. To stand against
            them, you and your organization must do the same. Whether utilizing patching, compliance, or security
            solutions  (or  better  yet,  all  of  those  in  a  single  platform),  it’s  important  to  regularly  evaluate  new
            technology innovations. Advancements around automation, machine learning and more, are streamlining
            endpoint security, reducing the false positive rates, and enabling IT and security teams to do more with
            less resource.




            4. Be Active

            All quality security programs require both a proactive and reactive approach to endpoint vulnerabilities.
            One key proactive approach is the continual active scanning of network devices to identify weak points,




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         73
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   68   69   70   71   72   73   74   75   76   77   78