endpoint security
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105739/alert-400x200.jpg)
Top threats impacting endpoint security decisions
Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …
![Windows 10](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102819/windows10-biohazard-400x200.jpg)
Is the Windows 10 controlled folder access anti-ransomware feature any good?
With last week’s release of Windows 10 Fall Creators Update, users get a new feature aimed at stopping ransomware from encrypting their most important files. It’s …
![mobile worker](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104400/mobile_worker-400x200.jpg)
Enterprises increasingly leveraging endpoint data for security investigations
Code42 confirmed how critical it is for organizations to access and leverage endpoint data for additional uses above and beyond backup and recovery. Among 155 IT professionals …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Most network endpoints are in the dark: Do you know how to find them?
Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Sophisticated threats? It’s usually the basic ones that get you
To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09110001/windows-400x200.jpg)
Maintaining Windows 10 security tops list of enterprise challenges
Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103119/user-400x200.jpg)
Infosec weakest links: Negligent employees and poor password policies
54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …
![Windows 10](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111848/windows10-preso-400x200.jpg)
Windows 10 will use protected folders to thwart crypto ransomware
Windows 10 Fall Creators Update (the next major update of Microsoft’s popular OS) is scheduled to be released in September, and will come with major new end-to-end …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Poor endpoint security can cost you millions in detection, response, and wasted time
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …
![doll](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104117/doll-400x200.jpeg)
Outdated systems and their link to data breaches
BitSight analyzed more than 35,000 companies from industries across the globe over the last year, to better understand the usage of outdated computer operating systems and …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104809/laptop-dark-400x200.jpg)
Email-borne threats: Watch your inbox closely on Thursdays
Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious …
![CoSoSys Endpoint Protector](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104149/CoSoSys-EP-400x200.jpg)
Endpoint Protector 5: Responsive interface and updated eDiscovery module
CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)