Don’t let endpoint security be an afterthought

Issue 4 2022 Infrastructure

Data management is critical not only for mitigating the risk of ransomware, but also for compliance with various data privacy and data protection regulations. Businesses have tools, policies and extensive systems in place to deal with this, but often forget about securing endpoints.


Iniel Dreyer.

An endpoint is any device that has access to a network, and this includes not only laptops and desktops, but also mobile devices and tablets. Any location where data is generated and stored needs to form part of an holistic data management approach, and if endpoints become an afterthought, they can be the source of vulnerability which creates a security loophole that could result in a serious data breach.

The biggest attack surface

Despite recent efforts being focused on data protection, the reality is that endpoints are still the biggest attack surface when it comes to ransomware and malware. When data is stored on a device, data protection needs to be deployed on it, including basic tools like antivirus and threat detection and prevention software. If data resides on a device, or it is created and/or stored on that device, there is also a compliance discussion that needs to be involved.

The reality is that at the endpoint, there is often a lack of stringent and enforceable policies in place to ensure that any data stored – especially sensitive information, personal information or corporate intellectual property – is protected effectively. It is imperative to include endpoints as part of any effective data management strategy, including insight into the data that lives on these devices, as this plays an important role in overall risk and compliance adherence.

The weakest link

With the rapid evolution of the workforce to a work-from-home and hybrid environment driven by the pandemic, endpoints have become something of a soft spot for malware to access networks, simply because they are not always adequately protected. Devices need to be secured, including mobile phones and tablets, and this should be part of corporate policy and not the responsibility of the individual. Ultimately, the business remains liable for a data breach regardless of where the vulnerability occurred, and the compliance issues and reputational damages will be the same.

People are often careless with their mobile devices, so all endpoints need to be paid the same attention in the data management design. Basics like antivirus, malware detection and prevention software, strong passwords and multi-factor authentication need to be in place, devices need to be secured, and data recovery strategies need to be in place should a data loss event occur. Furthermore, consistent policies need to be applied across all devices that access the network.

A proactive approach to data management

Data should never be managed in siloes, and the same applies to data created and stored on endpoint devices. However, businesses also need to become more proactive about data management, because managing data effectively is not just about protecting it but about preventing potential breaches and attacks.

Viruses are typically triggered on endpoint devices, and often do so undetected, but there are signs and behaviours that can indicate a breach before it can cause too much damage, such as higher-than-usual volumes of data being modified or downloaded. An effective data management strategy must include elements such as anomaly detection on devices to identify behaviours that are out of the ordinary, alert to potential problems and trigger policies to handle an event.

Data management is not just about protecting files, but also about preventing the spread of viruses and other malware. If endpoints are not considered as part of an overall data management strategy, they become an afterthought which could turn into a security loophole that raises the risk of a breach or a compliance issue.

Find out more at www.dm-p.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.