Decades ago, discussions about securing the enterprise were limited to the almost benign topics of virus tainted email attachments and the benefits of power-on passwords. Today, the landscape has morphed into a virtual minefield of potential vulnerabilities, thanks in part to the endpoint devices that connect organizations to the Internet.
Endpoint devices include everything from computers and servers to routers and switches – each an attractive gateway for possible intruders.
Let’s examine the top endpoint threats: