1. Know the Threat Your Organization Is Facing
To defend against an enemy, you must first know the enemy, Konetski said. For businesses, that means accepting that the security landscape has changed permanently.
“Things are not going to go back to the way they were pre-pandemic,” he said. “So that means you’re going to be dealing with a much larger attack surface and employees who are remote.”
Remote work has led to a dramatic increase in ransomware activity (148 percent, according to Konetski), and businesses have more elements of operations to protect.
“The entire model has changed,” Konetski said. “There’s no longer centralized security.”
With cyber espionage rising, it’s important for businesses to know how those bad actors operate.
“They’re watching to see how the data flows. They are watching to see where that sensitive information is being stored,” said Konetski. “The time between when they instantiate themselves on the network and when they launch their attack is called dwell time. We need to stop that malicious attack during that dwell time.”
MORE FROM BIZTECH: The keys to a digital future of work.
2. Assess Your Business’s Security Tools
For businesses to move forward with endpoint security, they must take a look at the solutions and protections they already have.
“How are you encrypting your sensitive information and protecting your data?” Konetski said. “How are you protecting yourself, detecting and remediating attacks?”
Organizations also need to consider the increase in cloud use that comes with remote work and the way user credentials are secured. Many security solutions have these safeguards built in, helping to identify problems using artificial intelligence.
“The first thing they want to do is find out if that bias was maliciously corrupted or whether it was just some kind of anomaly, or maybe it was just a pattern that was meant to be,” Konetski said.
He also said ensuring firmware is up to date is crucial.
“The scary thing is that by 2022, it’s been shown that 70 percent of organizations that do not have a firmware upgrade plan will be breached due to a firmware vulnerability,” Konetski said.
3. Build Your Data Protection Strategy
At the heart of an organization is its data, so it is important to build up those defenses in case endpoint solutions aren’t successful.
“When you’re thinking about a strategy for data protection, you have to think about security,” Konetski said. “What does your encryption look like? And key management members have to think about compliance.”