Report: Growing threats from unencrypted devices

Report: Growing threats from unencrypted devices

Share post

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment.

A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident.

16 percent andnencrypted devices

When an unencrypted device is connected to a corporate network in an office environment, there is less risk of a security incident. However, in the world of remote work, an unencrypted corporate device means that any communication sent to or from that device can pose a security risk, especially when connected to a network outside the office.

Every day, remote workers use corporate devices across multiple networks and locations. The latest data from Absolute shows that corporate devices are used in four different locations per day, on average. In today's world of remote working, unencrypted devices are becoming attractive targets for attackers looking for a vulnerability to exploit.

Inadequate encryption is not uncommon

In the event of a security incident, corporate devices contain sensitive data that can have costly financial and reputational consequences for a company. Absolute's most recent Endpoint Risk Report found that 22 percent of devices had inadequate encryption controls, providing further evidence that organizations are struggling to maintain encryption on their employees' computers.

The possibility of a malicious third party accessing sensitive data, applications, or networks through a vulnerable endpoint is a pervasive reality for organizations with mobile workers scattered across the globe. In response, organizations need a comprehensive security strategy that verifies users' identities regardless of their location in the world. A Zero Trust security solution is ideal for mitigating the risks of an unencrypted corporate device.

Zero Trust solves the problem of unencrypted devices

🔎 This is how often devices are used in companies (Image: Absolute Software).

The multi-layered approach of a Zero Trust security strategy gives the IT department several important tools. By redefining the network edge, IT teams can set their own requirements for contextual identity verification that protects an entire distributed workforce. This ensures that the IT department can check each employee's network connection.

In addition, it is vital for the IT department to be able to detect when encryption is weak. Poor encryption makes corporate devices vulnerable to security breaches. This underscores the growing need for endpoint visibility. Only then can the IT department fix security problems immediately and clean up compromised applications on remote cell phones and laptops.

Better visibility and control

Businesses that focus on visibility and control of their corporate devices stand the best chance of identifying and eliminating unencrypted devices. This is one reason why companies are increasingly adopting a zero trust approach to protect their employees and their data. Adopting a reliable, self-healing Zero Trust solution gives organizations the peace of mind they need in today's remote working world.

More at Absolute.com

 


About Absolute Software

Absolute Software accelerates its customers' transition to remote working with the industry's first self-healing Zero Trust platform that ensures maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices providing an always-on digital connection.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more