Economy minister discusses economic cooperation with German minister    Saudi Crown Prince congratulates new Japanese PM Sanae Takaichi    At UNCTAD, Saudi Arabia affirms commitment to sustainable economic transformation    Saudi justice minister, Italian counterpart agree to enhance judicial cooperation    TGA: Autonomous vehicle service beneficiaries surpass 950 in Riyadh    103 million orders delivered in Saudi Arabia in 3Q 2025    Yapı Merkezi reaffirms its commitment to Saudi Arabia with the opening of its regional headquarters in Riyadh A new step in Turkish Saudi cooperation    OMODA 4 Media Preview: Shaping the future of mobility with media and users    Belgian resistance holds up €140 billion loan for Ukraine at EU summit    Trump says he's ending trade negotiations with Canada    EU, US impose new sanctions on Russia to force ceasefire in Ukraine    Egypt joins EU funding program Horizon Europe    Riyadh Season 2025 draws 1 million visitors in 13 days    Athar Festival 2025 opens in Riyadh with record attendance, new creative streams, and Saudi-first innovations    Qatar clinch 2026 World Cup berth with 2-1 win over UAE in Doha    'India's Picasso' is breaking auction records — enraging the Hindu right    D'Angelo, Grammy Awardwinning R&B singer, dead at 51    Splash unveils new winter collection featuring Maya Diab    India players refused handshakes, says Pakistan coach    Adolescence star Owen Cooper makes Emmys history at 15    The key to happiness    Sholay: Bollywood epic roars back to big screen after 50 years with new ending    Ministry launches online booking for slaughterhouses on eve of Eid Al-Adha    Shah Rukh Khan makes Met Gala debut in Sabyasachi    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Employee-owned mobile devices a matter of concern
Published in The Saudi Gazette on 04 - 12 - 2019

Centralized logging and automation solutions are now a necessity to detect, defend against and respond to modern attacks, according to the SANS 2019 Endpoint Protection and Response Survey released by SANS Institute. These solutions include data analytics tools – such as security information and event management (SIEM) and endpoint detection and response (EDR) – as well as anomaly detection technologies like user behavior monitoring and machine learning.
"Attacks often start on employee workstations, then pivot to critical data sources on servers," said SANS instructor and survey co-author Justin Henderson. "That makes endpoints ground zero for protecting an organization's assets. But defending them from attacks isn't easy."
In fact, 39% of survey respondents have concerns about employee-owned mobile devices and lack processes to cover them in corporate policy. Employer-owned devices fare better, with only 25% being concerned about such endpoints and unable to cover them in organisational security plans. This lack of control may be related to the fact that fewer than 27% of employee-owned laptops and mobile devices are centrally managed.
"Due to the never-ending nature of cyberattacks, it is vital that organizations collect the data that will enable them to quickly identify the attack, mitigate any damage and remediate the issues," according to survey co-author and SANS instructor John Hubbard. "However, due to the complex nature of logging and multitude of data sources, many organizations struggle to gather the proper data they need to conduct efficient incident response and remediation activities."
While 11% of respondents report an inability to identify what data has been breached, and 66% find it difficult, the SANS survey indicates that a combination of file access auditing, DLP and EDR solutions might help organizations that struggle with these activities. The 2019 survey also shows that the use of next-generation endpoint controls is increasing within organizations. Anomaly detection increased by 10% and machine learning solutions increased by 12%. Even tools such as automation tools and vulnerability scanners increased in implementation by 5% year-over-year.
Other statistics identified in the report included:
• 62% of breaches can be identified within the first 24 hours
• 28% of survey respondents confirmed that attackers had accessed endpoints
• Phishing was the top attack vector (cited by 57.8% of respondents), followed by browser-based drive-by download attacks (51.8%) and then credential theft or compromise (48.2%). — SG


Clic here to read the story from its source.