Lock graphic
Blog

One Out of 10 Threats Still Make It to the Endpoint

Technology


Print Friendly, PDF & Email

New data from Acronis in their End-of-Year Cyberthreats Report shows that 11.7% of all attacks still make it to the endpoint. This is a slight increase from 9.4% in Q2 2022. These high percentages show that one out of 10 threats still make it to the endpoint, despite organizations’ best efforts at awareness training and patching.

Modern cyberattacks, data leaks, and ransomware outbreaks all show the same thing: cybersecurity is failing. This failure results from weak technologies and human error, often caused by clever social engineering.

Here are some ways you can boost your cybersecurity resilience and prevent cyberattacks:

  • Patch your OS and apps. This is crucial, as many attacks succeed due to unpatched vulnerabilities. Users tend to ignore system messages, especially when Windows asks for a restart — this is a big mistake. Be sure that auto-updates to popular software vendors like Adobe are enabled and apps like PDF Reader are updated promptly.
  • Prepare for phishing attempts, and don’t click on suspicious links. Malicious links can come from anywhere — instant messenger apps, email, forum posts, etc. Never click links you don’t need to click or that you didn’t expect to receive, and consider implementing security awareness training to help your employees recognize malicious emails.
  • Use a VPN while working with business data. Whether you connect to remote company sources and services, or if your work doesn’t require those activities and you just need to browse some web resources and use telecommunication tools, use a Virtual Private Network (VPN). VPNs encrypt all your traffic, making it secure against attackers who may attempt to capture your data in transit.
  • Keep your passwords and your working space to yourself. Ensure that your passwords — and your employees’ passwords — are strong and private. Never share passwords with anyone. Use different and long passwords for every service. Where possible, use multi-factor authentication for an extra layer of security.

Regularly, businesses need to determine what new employees need and whether there are better ways to secure IT infrastructure and sensitive data. Let us help you assess, measure, and track the costs of preserving your company’s cybersecurity.

Information used in this article was provided by our partners at KnowBe4.

Want To Learn More?

Connect with one of our professionals today.