{"id":20326,"date":"2020-12-03T22:19:58","date_gmt":"2020-12-03T21:19:58","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=20326"},"modified":"2021-02-11T12:43:37","modified_gmt":"2021-02-11T11:43:37","slug":"endpoint-protection-a-fundamental-challenge-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/endpoint-protection-a-fundamental-challenge-in-cybersecurity\/","title":{"rendered":"Endpoint protection. A fundamental challenge in cybersecurity"},"content":{"rendered":"<p>The <em>endpoints<\/em> are any point that is the final part of a network. Thus, smartphones, tablets, a desktop computer, laptop, printer, an ATM, POS are examples of <em>endpoints<\/em>.<\/p>\n<p>All the<strong> remote systems<\/strong> are more exposed to <strong>threats<\/strong> and the <em>endpoints<\/em> They are a relatively simple way to attack an organization, since cybercriminals can take advantage of a vulnerability in employee devices to infiltrate the company network, turning employees <em>endpoints <\/em>in important <strong>attack vectors<\/strong> for cybercriminals, where they can exploit your vulnerabilities<\/p>\n<p>Currently, we find ourselves in a situation where mobility and teleworking stand out, the fact that users connect to internal resources from <em>endpoints<\/em> off-premises, makes them more susceptible to cyberattacks.<\/p>\n<p>According to data from INCIBE (National Cybersecurity Institute), last year&nbsp;<strong>more than 120,000 incidents were recorded<\/strong> in Spain, this figure being a <strong>40% higher than the previous year.<\/strong><\/p>\n<p>Most companies are committed to reinforcing perimeter security, which is necessary, but not sufficient.<\/p>\n<p>The security of end devices must be protected with good practices such as:<\/p>\n<p>\u2013 Use detection and response tools to <em>endpoints<\/em> to identify and investigate suspicious activities on devices.<\/p>\n<p>\u2013 Use of state-of-the-art antivirus protection to prevent, detect and eliminate any malware. This type of antivirus uses machine learning and analysis to defend against attacks such as ransomware or advanced phishing, which would bypass the security of any conventional antivirus.<\/p>\n<p>\u2013 Keep computers, servers and mobile devices updated with the latest versions of the operating system and the latest security patches.<\/p>\n<p>\u2013 Updating applications to eliminate security risks, like operating systems, it is also necessary to have the company&#039;s mobile, desktop and server applications updated.<\/p>\n<p>\u2013 Limit privileges to users and processes so that they have the minimum number they need to perform their functions to reduce risk and increase security.<\/p>\n<p>A complete defense-in-depth security strategy for <em>endpoints<\/em> It is essential to offer complete cybersecurity protection.<\/p>","protected":false},"excerpt":{"rendered":"<p>Endpoint protection. A fundamental challenge in cybersecurity. We tell it to you in our blog!<\/p>","protected":false},"author":51,"featured_media":20327,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-20326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/20326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=20326"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/20326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/20327"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=20326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=20326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=20326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}