The Evolution of Cybersecurity: Ideal Endpoint Protection (Part 2)
The first part of The Evolution of Cybersecurity series, titled What Poor Endpoint Protection Entails, covered why antivirus (AV) software should not be relied upon for endpoint protection. In fact, the senior vice president for information from Symantec claims that the majority of attacks go undetected by traditional AV. The first takeaway is that common forms of AV are ineffective against encryption. The AV doesn’t have the key to access the file, and as such, it may not be analyzed, leaving the system vulnerable. The second takeaway is that AV must be configured independently for each unique device, including fax machines and printers. This may require significant manual labour if the devices are not linked, and automatically updated, via the cloud. Therefore, it can be costly and is often neglected.Read More…