The endpoint continues to be the one of the greatest weaknesses in organizational data security. If a mobile security incident were to occur in your organization, how would you respond? More importantly, what measures are you taking today to prevent a data security breach from happening in the first place?
According to the 2016 State of Endpoint Security Survey released by the SANS Institute on behalf of IBM, 44% of respondents report that one or more endpoints have been breached in the past 24 months creating a mobile security incident. Login and access credentials were reported as being the most commonly exfiltrated information during a mobile security incident.
44% of respondents report that one or more endpoints have been breached in the past 24 months | SANS Institute on behalf of IBM
Up to 80% of connected devices in organizations are vulnerable to malicious attack.
Data is vulnerable from every possible vector:
For certain industries, such as healthcare, the endpoint continues to be one of the top sources for data breaches. For all organizations, the endpoint presents a growing attack surface that is being exploited from every angle.
The fact that login and access credentials are the most commonly exfiltrated information during an endpoint breach is quite troubling and often difficult to detect. Our own definition of the Insider Threat defines this kind of breach as one involving an “unsuspecting / acting insider”. In other words, they become ‘puppets’ to a malicious outsider who exploits an employee's credentials to access the desired data. Most companies find it difficult, if not or impossible, to determine when an incident is fully remediated. Given the lack of endpoint visibility, this is not surprising.
Absolute provides unprecedented visibility into the endpoint and the data it contains so you can prevent mobile security incidents from occurring. The Endpoint Data Discovery (EDD) feature of Absolute DDS 6 allows you to see where your sensitive data is, at any time and whether your devices are on or off the network. It also gives you the ability to remotely check the status of security oversight (such as encryption) or to lock down devices or wipe this data. This enables you to comply with data security policies, address the Insider Threat, and remediate a data security incident (such as a lost device, irregular software or user behavior).
With this level of control over devices, you can react quickly to mobile security incidents and isolate an attack, or freeze a device before it becomes a full-scale data breach.
To learn more, download our data sheet.