Palestinians uncertain as FIFA, UEFA step in to save soccer pitch from Israeli demolition    House panel votes to hold Clintons in contempt in Epstein probe    Trump backs off tariffs threat, says Greenland deal framework reached    Saudi Arabia signs agreement with World Economic Forum to accelerate industrial transformation    Over 78 million faithful visit Two Holy Mosques in a month    Saudi FM meets British, French counterparts in Davos    Northern Saudi cities record coldest temperatures of winter as mercury drops to –3°C    Arab coalition condemns deadly attack on Giants Brigades commander in Yemen    Sha'ban crescent sighted Tuesday    Saudi POS transactions reach 236 million, SR4bn in one week    Al-Khateeb highlights Saudi-UN partnership to shape quality of life in future cities    122 million tourists spend SR300 billion in Saudi Arabia in 2025    Italian fashion legend Valentino dies at 93    Saudi orchestra brings 'Marvels of Saudi Orchestra' to AlUla with 107 musicians    Katy Perry makes Saudi debut at Joy Awards, praises Saudi design and hospitality    Hail wins Guinness World Record with largest off-road production cars convoy    SFDA approves registration of 'Anktiva' for treatment of bladder and lung cancer    Saudi Darts Masters 2026 to offer record $200,000 prize for nine-dart finish    Al Taawoun condemn "repeated refereeing injustice" after late penalty defeat    British boxer Anthony Joshua discharged from hospital after Nigeria car crash    The key to happiness    Sholay: Bollywood epic roars back to big screen after 50 years with new ending    Ministry launches online booking for slaughterhouses on eve of Eid Al-Adha    Shah Rukh Khan makes Met Gala debut in Sabyasachi    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Employee-owned mobile devices a matter of concern
Published in The Saudi Gazette on 04 - 12 - 2019

Centralized logging and automation solutions are now a necessity to detect, defend against and respond to modern attacks, according to the SANS 2019 Endpoint Protection and Response Survey released by SANS Institute. These solutions include data analytics tools – such as security information and event management (SIEM) and endpoint detection and response (EDR) – as well as anomaly detection technologies like user behavior monitoring and machine learning.
"Attacks often start on employee workstations, then pivot to critical data sources on servers," said SANS instructor and survey co-author Justin Henderson. "That makes endpoints ground zero for protecting an organization's assets. But defending them from attacks isn't easy."
In fact, 39% of survey respondents have concerns about employee-owned mobile devices and lack processes to cover them in corporate policy. Employer-owned devices fare better, with only 25% being concerned about such endpoints and unable to cover them in organisational security plans. This lack of control may be related to the fact that fewer than 27% of employee-owned laptops and mobile devices are centrally managed.
"Due to the never-ending nature of cyberattacks, it is vital that organizations collect the data that will enable them to quickly identify the attack, mitigate any damage and remediate the issues," according to survey co-author and SANS instructor John Hubbard. "However, due to the complex nature of logging and multitude of data sources, many organizations struggle to gather the proper data they need to conduct efficient incident response and remediation activities."
While 11% of respondents report an inability to identify what data has been breached, and 66% find it difficult, the SANS survey indicates that a combination of file access auditing, DLP and EDR solutions might help organizations that struggle with these activities. The 2019 survey also shows that the use of next-generation endpoint controls is increasing within organizations. Anomaly detection increased by 10% and machine learning solutions increased by 12%. Even tools such as automation tools and vulnerability scanners increased in implementation by 5% year-over-year.
Other statistics identified in the report included:
• 62% of breaches can be identified within the first 24 hours
• 28% of survey respondents confirmed that attackers had accessed endpoints
• Phishing was the top attack vector (cited by 57.8% of respondents), followed by browser-based drive-by download attacks (51.8%) and then credential theft or compromise (48.2%). — SG


Clic here to read the story from its source.