Chuck Leaver – The Endpoint Is Now The Target For Malicious Widely Distributed Attacks

From The Desk Of Chuck Leaver CEO Ziften Technologies

With the development of bring your own device (BYOD) strategies and cloud computing the protecting of particular endpoints has actually ended up being more difficult, as administrators could be making ease of data access a priority over security. The threats exist however, because most of the existing generation of endpoint security software have not been modified to protect from aggressive hacking and harmful cyber attack methods that target specific endpoints as the launch pad for attacks that are widely distributed.

There was a really well-known endpoint attack that occurred in recent times where a malware family called Comfoo was utilized to jeopardize the networks of lots of multinational organizations back in 2010. The Comfoo malware consisted of a number of custom developed backdoor Trojans and exploits that could continuously disperse malware. A more serious repercussion was that this malware could cause harmful data leakage by scraping account and network information and monitor all user input, according to CRN contributor Robert Westervelt. It is believed that the Comfoo malware could have been a part of a sophisticated cyber espionage project, because of the method that was used and the evasion of traditional endpoint monitoring.

Utilizing e-mail phishing and social engineering the malware was able to jeopardize targeted gadgets, which highlights how ripe endpoints have ended up being for malware infestation, so states Jason O’Reilly, security executive. When he was speaking with ITWeb, O’Reilly stated that standard endpoint software does not sufficiently account for access from places beyond the IT department most of the time, and it does not restrict data exposure to authorized parties through using access controls.

O’Reilly stated that “endpoint security services need to offer layered security that surpasses signature-based detection just to include heuristic-based detection and polymorphic-based detection.” “Today’s networks are exposed to dangers from various sources.”

Real Time Threat Capturing And Report Creation

The high stakes for control techniques and endpoint security were recognized by business consulting company Frost & Sullivan, as they felt both of these areas were under pressure from both external attackers and the pressing demand from employees for device choice versatility.

Chris Rodriguez, Frost & Sullivan analyst mentioned “business IT organizations now deal with tremendous pressure to allow employees to access the business network and files from their own individual devices.” “Considering their apparently omnipresent nature, fast data connections, and powerful hardware and os, these gadgets represent prime targets for hackers.”

When asked exactly what organizations can do to tighten up on the distinct weaknesses of mobile hardware, O’Reilly advised that any solutions need to provide clear and comprehensive visibility into exactly what is happening on each endpoint so that action can be taken rapidly when any dangers are spotted.

 

~leaverchuck1


No Responses Yet to “Chuck Leaver – The Endpoint Is Now The Target For Malicious Widely Distributed Attacks”

Leave a Reply