Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment.
A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident.
16 percent andnencrypted devices
When an unencrypted device is connected to a corporate network in an office environment, there is less risk of a security incident. However, in the world of remote work, an unencrypted corporate device means that any communication sent to or from that device can pose a security risk, especially when connected to a network outside the office.
Every day, remote workers use corporate devices across multiple networks and locations. The latest data from Absolute shows that corporate devices are used in four different locations per day, on average. In today's world of remote working, unencrypted devices are becoming attractive targets for attackers looking for a vulnerability to exploit.
Inadequate encryption is not uncommon
In the event of a security incident, corporate devices contain sensitive data that can have costly financial and reputational consequences for a company. Absolute's most recent Endpoint Risk Report found that 22 percent of devices had inadequate encryption controls, providing further evidence that organizations are struggling to maintain encryption on their employees' computers.
The possibility of a malicious third party accessing sensitive data, applications, or networks through a vulnerable endpoint is a pervasive reality for organizations with mobile workers scattered across the globe. In response, organizations need a comprehensive security strategy that verifies users' identities regardless of their location in the world. A Zero Trust security solution is ideal for mitigating the risks of an unencrypted corporate device.
Zero Trust solves the problem of unencrypted devices
The multi-layered approach of a Zero Trust security strategy gives the IT department several important tools. By redefining the network edge, IT teams can set their own requirements for contextual identity verification that protects an entire distributed workforce. This ensures that the IT department can check each employee's network connection.
In addition, it is vital for the IT department to be able to detect when encryption is weak. Poor encryption makes corporate devices vulnerable to security breaches. This underscores the growing need for endpoint visibility. Only then can the IT department fix security problems immediately and clean up compromised applications on remote cell phones and laptops.
Better visibility and control
Businesses that focus on visibility and control of their corporate devices stand the best chance of identifying and eliminating unencrypted devices. This is one reason why companies are increasingly adopting a zero trust approach to protect their employees and their data. Adopting a reliable, self-healing Zero Trust solution gives organizations the peace of mind they need in today's remote working world.
More at Absolute.com
About Absolute Software Absolute Software accelerates its customers' transition to remote working with the industry's first self-healing Zero Trust platform that ensures maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices providing an always-on digital connection.