Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Endpoint Security Blog
Showing posts tagged with Mobile Security
Showing posts in English
Spencer Parkinson | 19 Apr 2011 | 0 comments

More than ever before, smartphones are keeping us connected both personally and professionally. Because most of us have a preference as to the ideal smartphone, IT departments are increasingly being tasked with managing a mix of business-liable and employee-liable devices. This trend has become known as the consumerization of IT.

Symantec has developed a short survey to get smartphone end users’ perspectives on this trend. We’d also like to learn more about how your employer is managing the growing use of smartphones, especially those being purchased and brought into the organization by employees. The quick five minute survey can be found here: http://bit.ly/gsdgmX.

Once you’ve taken the survey, please stay tuned to this blog as we’ll be sharing the results once the survey is complete.

khaley | 07 May 2010 | 2 comments

One of the smartest security guys I ever knew once said “It’s about the endpoint stupid.”  Now that part about stupid was rhetorical, not directed at me.  I think.  But what he meant was that the most important things to protect were the endpoints.  Not that other parts shouldn’t be protected, but that the endpoints were the critical pieces.  And recent facts have backed him up.
 
Look at the latest ISTR numbers.  In 2009 four out of the top five targeted vulnerabilities were client-side vulnerabilities.  The largest cause of breaches in 2009 were  lost or stolen endpoints (laptops in this case).  And even when information was stolen via hacking, the hacker was targeting the endpoints.  It’s much easier to get inside an organization by planting malware on a client system, then to attack a well guarded server or break through a firewall.  And if the Hydraq attacks...