Endpoints are a growing security problem, survey says
Nearly half of the endpoint devices corporations manage are at risk because they’re no longer on the information technology organization’s radar or critical software is outdated, according to a survey released today.
The survey, by endpoint management firm Adaptiva Corp. and conducted by Ponemon Institute LLC, says that’s despite the $4.25 million the average enterprise spends to protect endpoints, which are defined as remote computing devices that communicate on a network. The Managing Risks and Costs at the Edge report surveyed 629 U.S.-based IT and cybersecurity practitioners at organizations with an average of 13,213 employees and $184.3 million in annual IT spending.
Nearly two-thirds of respondents said lack of visibility into endpoints is their organization’s most significant cybersecurity vulnerability. Keeping operating systems and applications current is the biggest problem (cited by 62%), followed closely by patches and security updates (59%) and network settings and connectivity issues (50%). Half said the shift to the remote workforce has made it more challenging to deliver updates and patches.
A big part of the problem is that the number of distribution points organizations use to update connected endpoint devices has grown as the workforce has become more distributed over the last two years. The average enterprise now has one distribution point for every six connected devices and the average endpoint has seven different management and security agents installed, which complicates visibility and control. Only one-third of respondents said their organizations are effective at reducing distribution point sprawl.
Two-thirds said their organizations lack the resources needed to minimize endpoint risk and they estimate, on average, that they are only equipped to stop at about half of endpoint attacks. The biggest threat to endpoint security was deemed to be ransomware, followed closely by zero-day or unpatched attacks and distributed denial-of-service attacks. Email is the most common attack vector, followed by application program interfaces and vulnerabilities introduced by software updates and patches.
Of the 54% of organizations that suffered an average of five endpoint attacks over the past year, mean losses totaled $1.8 million, with downtime being the costliest factor.
The survey indicated that there is a disconnect between IT operations personnel — who are responsible for monitoring endpoints and distributing updates — and the cybersecurity practitioners who dictate security policies and respond to incidents.
For example, 57% of operations people said the remote workforce has made it more difficult to deliver updates and patches, compared with 40% of security practitioners. Operations professionals also cited the difficulty of maintaining new operating system and application versions to a much greater degree than their cybersecurity peers and were somewhat more likely to say their organizations have established clearly defined roles and accountability for safeguarding sensitive information.
Image: Pixabay
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU