This page is fully or partially automatically translated.
- Technical contribution
- Cloud and Mobile Security
Security chain of four makes endpoints secure
Secure computers, secure network: the formula for success for malware-free working in companies sounds simple. Experts consider four protective measures a must.
Sometimes, unfortunately, special circumstances are needed to spark off long overdue changes. The radical transformation of the world of work in the wake of the Corona crisis demonstrates this impressively, particularly with regard to IT security. For years, security experts have been recommending that the endpoint be particularly strongly secured. Apart from the installation of an anti-virus solution, often very little has happened - many administrators thought that the computers in company offices were well protected by firewalls and other measures.
Paradigm shift in IT security through mobile working
But things turned out differently: from one day to the next, employees moved into the home office. And they left the secure network environment. Practice shows that many organisations and their employees are not sufficiently protected within their own four walls. A current study by the German IT Security Association (TeleTrusT) proves: Only two thirds of all computers are password-protected, only six out of ten use anti-virus software and only one in five secure network access with multi-factor authentication.
The country needs new security
Michael Schröder, technology and data protection expert at ESET Germany, knows what modern endpoint protection could look like: "A high-performance anti-malware solution is mandatory for every device. In combination with a hard disk encryption and multi-factor authentication solution as well as cloud sandboxing, administrators transform PCs and laptops into the so-called multi-secured endpoint. The good thing about it: With this security four-chain, they are perfectly secured everywhere - in the company office, in the home office or in mobile use.
Encryption stops data sniffersAll information stored on the endpoint should be protected from prying eyes or in case of loss. By using encryption, those responsible kill two birds with one stone. Cyber criminals cannot do anything with the encoded data and at the same time the company complies with the requirements of the basic data protection regulation. A prerequisite for the success of encryption is user acceptance. Therefore, the solution should hardly be "noticeable" and reliable in its daily work. A good example is "ESET Full Disk Encryption" (EFDE) with pre-boot authentication, which reliably secures entire device hard disks.
From home office to network: Only with multi-factor authentication
For every administrator it is a nightmare when someone logs into the network whose identity is not clearly defined. Therefore, multi-factor authentication should be implemented additionally. There are a number of solutions on the market that are easy to use and inexpensive to purchase. Professional software solutions such as "ESET Secure Authentication" (ESA) pave the way for secure access to online applications and network environments. In less than a quarter of an hour, complete networks with thousands of computers can be equipped with them. No additional hardware purchases are necessary, existing smartphones, FIDO sticks or other tokens can be integrated without any problems.