As 2022 progresses, the latest threat intelligence data from makes it clear that the end point devices are a ripe target for cyber attackyes “In this new normal of hybrid workforces, endpoints can no longer rely on a strong perimeter to identify and catch most threats.,” the annotated report. Centering the focus on the end point itself Y searching in shapes of best Secure end-user computing makes sense because Endpoint and ransomware attacks in the first three quarters of 2021 alone exceeded all of 2020.
Malware is also becoming an increasingly simple endeavor for cybercriminals, even those new to the space. “With tools like PowerSploit, PowerWare, and Cobalt Strike, even low-skilled attackers can take everyday malware payloads and execute them using sophisticated memory injection techniques to evade detection,” the report says. Similarly, ransomware as a service is helping to intensify ransomware attacks.. “Would-be criminals no longer need coding skills to carry out devastating attacks against organizations thanks to commodity offerings available on the dark web and underground forums.”, noted WatchGuard.
Combating these escalated threats at the endpoint requires organizations look at all the ways threats could succeed and harden checks on each element: yoube activity, the operating system itself, politics and Access controls, antivirus software, detection of suspicious or anomalous byte sequences, chain of trust, virtualization and cloud computing. This defense-in-depth strategy is a multi-layered approach that uses physical, technical, and administrative controls to protect an organization against ransomware threats..
Be security agnostic
Us Need to extend our thinking beyond just being device agnostic to be entirely security agnostic; acknowledging thathybrid workforce introduce unauthorized devices at some point. IT security must focus on practices that reduce risk regardless of where or what device a person is using at the time.. Be security agnostic is the answer to another hybrid workforce trend: Hoteling— which is now gaining strength in 2022 As companies reconsider the expensive office space they probably still have. Similar to hotel reservations, workers can reserve office space or just a desk to work on site as necessary. They may or may not bring a device with them, so security protocols should be agnostic, or at least standardized across devices, to support what is becoming a permanently fluid work style.
Take advantage of virtualization Y Inherently secure operating systems
Move Windows to the data center or the cloud and use a thin, intrinsically safe Operating system (SW) can enable more secure access to apps and data. for example mMoving Windows off the endpoint is the logical strategy as cloud-based applications like Azure Virtual Desktop with Windows 365 and those from VMware and Citrix are now the virtualization standard for end user computing. This also helps to consume less staff time by speeding up the application of patches and other security updates throughout the endpoint environment; it also greatly reduces risk at the endpoint. A user, either remote or on site, can open their device, access data and applications in the cloud and minimize the chances of introducing a threat.
for optimal success, a linux-based operating system built for VDI, DaaS and digital workspaces can be structured as a modular, read-only, tamper-proof firmware base. This database will not contain any business data for hackers to target What all data is stored in the cloud. A wide range of security-focused features can be designed into the operating system to minimize exposure and deter attackers from infiltrating an organization through the endpoint.