TechShoutTechShout
  • Home
  • Features
    FeaturesShow More
    games that are like minecraft
    34 Games Like Minecraft: Explore, Build, Survive With Friends
    Aug 1, 2024
    Fairy-tale Tower
    27 Magical Minecraft Fairy Builds for Every Fantasy Lover
    Aug 20, 2024
    Face Recognition Search Engines
    Top 9 Face Recognition Search Engines for Accurate Results
    May 6, 2024
    AI Headshot Photo Generators
    11 AI Headshot Generators For Professional Photos [Free & Paid]
    May 6, 2024
    Snapchat Planets Order In Friend Solar System
    Snapchat Planets Order In Friend Solar System: Meaning & How It Works
    May 2, 2024
  • Alternatives
    AlternativesShow More
    Game Like Gang Beasts
    14 Must-Play Games Like Gang Beasts For Party Game Enthusiasts
    Jan 6, 2024
    games like kenshi
    22 Games Like Kenshi For The Intrepid Player
    Dec 13, 2023
    Omegle Alternatives
    13 Omegle Alternatives For Random Video Chatting [2024]
    Jan 6, 2024
    Best ThinkGeek Alternatives
    17 Best ThinkGeek Alternatives: Ultimate Guide To Geek Shopping
    Nov 19, 2023
    Games like Core Keeper
    18 Games like Core Keeper: [The Ultimate Guide]
    Jan 3, 2024
  • Categories
    • Apple
    • Games
    • Internet
    • Mobile Phones
    • Gadgets
    • Code
    • Software
    • Hardware
    • Cryptocurrency
    • Artificial Intelligence
    • Laptops
    • Business
    • Security
    • Electric
    • Social Media
  • About Us
    • Who We Are
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
Reading: Can Better Endpoint Security Protect Businesses From Data Breaches?
Share
Font ResizerAa
TechShoutTechShout
Font ResizerAa
  • Home
  • Alternatives
  • Features
  • Games
  • Guides
Search
  • Home
    • About Us
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
    • Sitemap
  • Categories
    • Alternatives
    • Anime
    • Apple
    • Artificial Intelligence
    • Business
    • Code
    • Cryptocurrency
    • Electric
    • Features
    • Gadgets
    • Games
    • General
    • Guides
    • Hardware
    • Internet
    • Laptops
    • Mobile Phones
    • Science
    • Security
    • Social Media
    • Software
    • Space
    • Tech Reviews
    • TVs
Follow US
Home > Security > Can Better Endpoint Security Protect Businesses From Data Breaches?

Can Better Endpoint Security Protect Businesses From Data Breaches?

Bertila Helena
By Bertila Helena - Deputy Editor Last updated: Dec 21, 2023
11 Min Read
SHARE

Multiple Communication Options

An organization that has either fully remote or hybrid workers constantly faces the threat of security violations. One can assume that it’s in a slightly more precarious position if employees are using devices that are not even registered by the company and thus lack proper protection.

A successful phishing campaign might leak user credentials to malicious actors and give them illicit access to high-privileged accounts. A laptop running out-dated software might enable a backdoor attack on the organization’s central IT system, exposing its critical business data.

Table Of Contents
Zero Day ExploitsState-Sponsored Hackers Targeted Vulnerability In Chrome“Phishy” Emails Are Still Fooling PeopleGuLoader Malware Transmitted Via PhishingVPNs Are Not EnoughEyeSpy Delivered Via Tainted VPN InstallersImproving Endpoint Security: An OverviewWrapping up

Basically, cyber-criminals are always looking for weaknesses they can exploit and remote working has opened up new endpoints for them to target. For a business, endpoints are all the computers, IoT devices, servers, smartphones, tablets and similar hardware which connect to its IT network. Endpoint security covers the security measures taken to protect these systems from breaches.

Read More

Malware Virus Hacker
After LastPass Data Breach, Can Password Managers Still Be Trusted?
How Much Info About You Is Available Online?

So how can proper endpoint security help businesses protect their remote workers and their own interests from hackers?

First, let’s dive into three endpoint-related cybercrime cases to highlight ways that endpoint devices can be compromised.

Zero Day Exploits

Malware Virus HackerA software vulnerability that hasn’t been patched because it hasn’t been discovered by the vendor or developer in question is called a zero-day. An attack that targets such a vulnerability is called a zero-day exploit. Since the vulnerability is not known to the software vendor or creator at the outset, it’s very difficult to predict such exploits.

Cyber criminals generally attempt zero-day attacks for the purpose of gaining high level system access and stealing valuable information, manipulating data, disrupting company operations, pilfering money and so on.

Mitigating such attacks mostly require manual intervention from security teams for quick deployment of security patches. Vulnerability scanning systems are available to combat these threats, but they’re not yet sophisticated enough to thwart them entirely.

State-Sponsored Hackers Targeted Vulnerability In Chrome

Back in February 2022, Google’s Threat Analysis Group discovered that a zero-day remote code execution vulnerability in the Chrome browser, CVE-2022-0609, was being exploited by two groups of North Korean government-sponsored hackers.

Described as “Use after free in Animation”, the exploit kit employed by both groups released a Chrome remote code execution hack capable of escaping the Chrome sandbox and moving into victims’ computer systems.

The attack targeted individuals in the news media, fintech, cryptocurrency and IT industries. The targets were sent fake recruitment-related emails with links that once clicked on, would serve a hidden iframe that would trigger the exploit kit. This leads us to the next point.

“Phishy” Emails Are Still Fooling People

phishingIn August 2022, the notorious Lazarus group were reported to have lured select Apple Mac users with bogus job emails carrying malware. It seemed to echo the CVE-2022-0609 exploit in the manner in which it presented itself to victims – a fake recruitment offer from a renowned company.

But most people surely know by now that phishing has been used successfully by hackers for years? Unfortunately, this is a kind of social engineering attack which takes advantage of our biases as well as our tendency to trust the sender of the message, if they’re a reputable or familiar person, company or brand. That’s why they still work.

Hackers “phish” for a victim’s personal information, access to enterprise systems, passwords and so on. The target may also be tricked into transferring money to the fraudster’s account among other things. Although phishing can take place over text messages or phone calls, emails are generally the weapon of choice.

This kind of attack has been given various names based on the technique used and the intended victim – whaling, vishing, smishing, and spear phishing are some of the alternate terms.

GuLoader Malware Transmitted Via Phishing

A fileless shellcode based malware downloader dubbed GuLoader initially spotted in 2019, was found to be spreading through phishing campaigns. It set off a lot of alarm bells because of how versatile it was, and its skill at evading detection and analysis.

Cut to 2023 and GuLoader is still out there, this time targeting eCommerce companies in several nations. After Microsoft blocked macros by default in Internet-downloaded Office files, the hackers behind this phishing campaign started using NSIS executables for malware deployment.

VPNs Are Not Enough

vpn securityDuring the first wave of remote work at the start of the pandemic, many companies turned to Virtual Private Networks (VPNs) to form a safe tunnel for communicating with their employees. Of course, enterprises with critical data to protect had been using VPNs even before that, especially so workers hooked up to unsecure WiFi hotspots didn’t inadvertently offer up their devices as points of vulnerability.

Although a VPN service is a great tool for encryption of the data that is transferred from a remote worker’s devices to the company’s system and vice versa, it’s not enough. A security strategy that covers endpoint devices with layered, protective technology is a far safer bet than simply depending on VPNs.

EyeSpy Delivered Via Tainted VPN Installers

Ever since Iran banned VPNs that do not fall in the government-approved list of VPNs, a new malware that repurposed a legitimate surveillance tool called EyeSpy came to light. While the original software was officially sold to businesses wishing to monitor their remote workers’ activities, threat actors reengineered it to infect compromised VPN installers.

The malware was found to be capable of logging keystrokes, taking screenshots, and collecting passwords stored on browsers. It poses a security and privacy threat to victims, considering the harsh repercussions facing citizens the Iranian government identifies as dissidents.

Improving Endpoint Security: An Overview

The emergent remote working culture is not the only added threat to endpoint security. Bring Your Own Device (BYOD), a policy that allows employees to work from their personal laptops or phones even while they are on company premises, can create security gaps too.

Then there’s the issue of shadow IT. It refers to the use of unregistered IT systems, software or devices within a company by employees or departments, without the knowledge of the centralized IT department. This can add to the problem of compliance errors and security vulnerabilities.

To improve endpoint security, start with device posture checks. This means setting up a system (or using a readymade solution) to ensure that only “trusted” devices can connect to your company’s network. It is done by examining the security-related data of the device or gadget in question – firewall and antivirus status, operating system version, disk encryption tech and so on.

Device posture checking is carried out once per connection or on a continuous basis. Laptops, smartphones, servers, IoT gadgets and similar hardware which do not meet the pre-established security rules set by the admin are not given access to the network, thus lowering the chances of data leaks and cyber-attacks that could occur via endpoint devices.

Encourage employees to report all the devices, apps and software they use for work purposes even if you have a suitable device posture checking system in place. Consider working Machine Learning (ML) into your security strategy for endpoints. When deployed correctly, it can help predict and prevent cyber threats in a more dynamic manner as compared to traditional technology.

A robust endpoint security program should be able to provide combined supporting functionalities including, but not limited to, remote access VPN, spam filters, advanced threat prevention, endpoint detection and response (EDR), data security, and protection of the network.

Last, but not the least, conduct employee training sessions to raise awareness about cyber security threats such as malware, phishing, spyware, unsecured WiFi networks and so on. They should also be updated on the security protocols they’re required to follow while connected to the company’s IT system.

Wrapping up

With more and more phishing campaigns, ransomware cases, and data breaches making the headlines these days, it’s evident that cybercrime rates are only climbing.

It’s getting increasingly difficult for companies to keep their own data as well as that of their vendors, partners, employees and customers safe. We also happen to be at a point where more information than ever before is being gathered by businesses everywhere.

Most companies are expected to face a data breach at some point or the other. Businesses can attempt to reduce the incidences of security violations and social engineering attacks with layered protection, regardless of the means used by employees to connect to the enterprise system.

For companies of all kinds and sizes, adequate endpoint security is the key to ensuring that their data is kept as safe as possible from spies and cyber criminals.

Was this article helpful?
YesNo

You Might Also Like

Benefits Of Strong Passwords

Preventive Measures Against Chrome Hijacking: Guide

Benefits Of Securing Your Business Data With Passwordless Login

What Is Fileless Malware?

How To Protect Your Devices From Cyber Threats: Handy Guide

Share This Article
Facebook Twitter Flipboard Pinterest Copy Link Print
Share
bertila-photo
By Bertila Helena Deputy Editor
Follow:
Bertila Helena has been a guiding voice in tech, gaming, and anime at TechShout since 2009. With a career spanning over 14 years, she has developed a keen eye for technological trends and their cultural impact. Her work reflects a deep understanding of the digital landscape as well as her enthusiasm and expertise. Bertila's expansive knowledge in the field is paralleled by an equally passionate coverage of gaming and anime, where she delves into narratives and their interplay with cultural mores. Her love for anime was kicked off by Ghost in the Shell and Neon Genesis Evangelion, while her passion for gaming started with Prince of Persia, Quake, Half-Life, Counter-Strike and NFS.
Previous Article password lock Benefits Of Securing Your Business Data With Passwordless Login
Next Article twitter logo 2 Twitter Faces Major Global Outage Again

Trending Stories

Demand Planning
Software

Top Features of Advanced Demand Planning Software

games that are like minecraft
Features

34 Games Like Minecraft: Explore, Build, Survive With Friends

Fairy-tale Tower
Features

27 Magical Minecraft Fairy Builds for Every Fantasy Lover

Business Automation POS
Business

How To Boost Productivity with Data Analytics & Automation of Business Operations

dress to impress dti outfit
Games

Roblox Dress To Impress (DTI) Codes (August 2024) *Updated*

Cybersecurity - Tackling Multi-Vector Attacks
Security

Cybersecurity Resilience: Tackling Complex Multi-Vector Attacks

Follow us on Social Media:

Facebook Twitter Youtube Pinterest

©TechShout.com 2005 - 2024. All Rights Reserved.

More from TechShout

  • About Us
  • Privacy Policy
  • Editorial Policy
  • Contact Us
  • Advertise
  • Sitemap
Welcome Back!

Sign in to your account

Lost your password?