Protect your endpoints

With more people than ever working from home, it’s vital to ensure that laptops, mobiles and PCs in homes are secure

Your staff may be keeping their distance during the Covid-19 pandemic, but cybercriminals aren’t. On the contrary, the year so far has seen a huge increase in attacks, as workers have moved outside of the company firewall – often on laptops that lack proper protection against intrusions and malware 

It’s no mystery how this situation came about. When the pandemic was declared, many smaller businesses found themselves suddenly forced to embrace remote working, with no time to formulate proper security policies and implement a managed transition. By now, though, your workers’ laptops, workstations and mobiles really ought to be properly locked down: if they’re not, it’s high time you took action.

The good news for SMBs is there’s a wealth of affordable solutions on the market that can be deployed in minutes. They all perform real-time malware detection and prevention services, and many also offer protection against dodgy websites, email scanning and more.

Cloud connected

The first question is whether you want your end point solution to be managed locally or in the cloud. The local approach gives you maximum control, and can suit organisations where everyone’s located in the same office – but you’ll need to provide your own host system to run the central server component, and things get more complicated if your users start moving between multiple locations, or indeed working from home.

In most cases, therefore, cloud-hosted endpoint protection works best. Once you’ve set up your cloud account, you can use a secure web portal from anywhere to centrally manage all endpoint protection components, regardless of their physical location.

In order to manage your end points, each one will need to have a software agent installed. This can normally be downloaded from the cloud portal; for a home-based workforce, a better solution might be to email each user a download link. If you take this route, it’s a good idea to tell remote workers to expect the email and what will happen when they click on the link. In most cases, an agent takes ten to 15 minutes to install, link up to your cloud account, configure itself as per your preset security profile and immediately begin protecting the device.

Close protection detail

Whether your chosen solution is locally or cloud-hosted, there are a number of key features that should be on your shopping list. Malware protection is, of course, essential: the agent should prevent malicious software from getting onto a user’s desktop by continuously monitoring all entry points. After the initial installation, it’s also recommended to carry out a complete scan of the entire system to ensure there’s nothing nasty already hiding there. To be on the safe side, you can set up scheduled system scans to run at quiet times such as overnight, although this depends on your users leaving their computers switched on.

We recommend you choose a product that extends its protection to web activity too: this enables the agent to block access to suspicious sites before the user has a chance of exposure to malicious content. Many security products also offer category-based URL content filtering, which lets you block users from using their work laptop to access unproductive sites such as games, gambling and social media.

Agents need to be kept up to date with the latest malware signatures, so ensure that your policies are set to push them out to end points as soon as the vendor releases them. You also don’t want to run the risk of meddlesome users either disabling or removing the agent, so look for products that can protect their own settings with a password.

Related Resource

Introducing VMDR: Vulnerability Management, Detection and Response

The all-in-one vulnerability management service

Download now

You’ve got mail

With so many people working from home in recent months, we’ve seen a big increase in phishing attacks, or legitimate-looking emails containing links to websites that try to download malware or trick the user into giving away sensitive information. Endpoint solutions vary considerably in how they deal with email-borne threats, meaning it pays to research them to see which one offers the features you need. All four products on review this month have the ability to scan incoming messages for malware, strip out infected attachments and block links to malicious sites. Not all include integrated spam protection, though: some lack it entirely, while others offer it only as a chargeable add-on.

Be aware that these protections can’t ever be perfect. The tricks and tactics used by scammers are constantly evolving, and sooner or later something could slip past your end point solution. We recommend training your remote workers to recognise possible phishing attempts, and giving clear advice on how to handle and report them.

Goin’ mobile

When it comes to protection against malware and hacker attacks, the primary focus is naturally on laptops – but smartphones aren’t immune, and these need protection too. This is another area where support is varied: one of the products on review this month doesn’t protect mobile platforms at all, one includes a full set of mobile features as standard and the other two provide these components as chargeable add-ons.

Other useful features include app and device controls. These allow you to block certain types of apps from being run on remote workstations, and prevent company data from being copied to removable media.

Alerting and reporting functions are important too, warning you right away if any of your users are under attack. You should have the option to receive email alerts whenever a security event occurs, meaning you can deal with it before it can spread and cause mayhem; the management dashboard should also bring the details to your attention so you can take immediate remedial action.

On the pages that follow we will help you choose the right end point security solution to keep your workforce safe during and beyond these challenging times. And since each product is available in a time-limited but otherwise fully functional evaluation edition, you can test your chosen product yourself before you invest.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Most Popular

Microsoft hints at stand-alone successor to Office 2019 suite
Microsoft Office

Microsoft hints at stand-alone successor to Office 2019 suite

24 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020