{"id":43657,"date":"2022-02-15T01:51:13","date_gmt":"2022-02-15T06:51:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=43657"},"modified":"2022-02-16T02:31:17","modified_gmt":"2022-02-16T07:31:17","slug":"explaining-endpoint-detection-response","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/explaining-endpoint-detection-response\/43657\/","title":{"rendered":"This balloon shows why businesses need better endpoint security"},"content":{"rendered":"<p>It\u2019s not easy getting your head around endpoint protection for business. But with a toothpick and a balloon, Matt White, CEO of software-as-a-service platform <a href=\"https:\/\/xaas.co.uk\/\" target=\"_blank\" rel=\"noopener nofollow\">XaaS Ltd<\/a>, makes it simple.<\/p>\n<p>Every organization\u2019s \u2018<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/attack-surface\/\" target=\"_blank\" rel=\"noopener\">attack surface<\/a>\u2018 has expanded like a balloon thanks to increasing digitalization and smart devices in the workplace. But cybercriminals, like a toothpick trying to pop that balloon, now have more ways of getting in and reducing your network to shreds. The reality is even more extreme, White says, with thousands of cybercriminal toothpicks trying to pop your balloon at once.<\/p>\n<p>The toothpicks are also getting sharper, suggests Kaspersky Senior Security Researcher Noushin Shabab. \u201cCybercriminals are now using AI and machine learning to make their attacks more sophisticated.\u201d<\/p>\n<h2>What are endpoints, and why better protect them?<\/h2>\n<p>Today, businesses\u2019 attack surfaces are bigger than ever because there are more \u2018endpoints\u2019 \u2013 any device connected to the network, from mobile phones to webcams to <a href=\"https:\/\/www.tomorrowunlocked.com\/internet-of-things-iot-cyberattacks\/\" target=\"_blank\" rel=\"noopener nofollow\">fridges<\/a>. White says that\u2019s \u201ca total chaotic mess\u201d from a security perspective.<\/p>\n<blockquote><p>Endpoints are the heart of the risk. They\u2019re the route in for your employees and the machinery you use for your work. But they\u2019re also a route in for attackers.<\/p>\n<cite><p>Matt White, CEO, XaaS Ltd<\/p><\/cite><\/blockquote>\n<p>Endpoints are cybercriminals\u2019 favorite way to get into networks. Market data analysis firm <a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/10\/27\/improving-endpoint-security-needs-to-be-a-top-goal-in-2020\/#42acd6b05608\" target=\"_blank\" rel=\"noopener nofollow\">IDC\u2019s 2019 study found 70 percent of breaches started at an endpoint<\/a>.<\/p>\n<h2>What\u2019s the best way to protect endpoints?<\/h2>\n<p>Antivirus software used to do much of the heavy lifting in business security, but White says the new threat landscape demands more robust security. \u201cEndpoint detection and response (EDR) is like antivirus on steroids. It doesn\u2019t just detect and identify. It isolates malicious code and repairs. Spending more on that kind of system is like an insurance policy \u2013 it may protect you from a lot more damage down the line.\u201d<\/p>\n<p>He compares endpoint detection and response with a COVID-19 vaccination. \u201cYou know you may still catch it, but you can make it far less serious by getting a vaccine upfront.\u201d <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/managed-endpoint-detection-response\/36539\/\" target=\"_blank\" rel=\"noopener nofollow\">Check what level of endpoint protection your business needs<\/a>.<\/p>\n<p>White thinks the new cyber threat level demands a new way of working, too. \u201cIt\u2019s not just plugging in the latest shiny box that\u2019s going to secure a network. Everyone has to work together \u2013 all parts of a company, regulators, financial authorities \u2013 to create collaboration. It\u2019s a team game.\u201d<\/p>\n<p>And that might be a good thing for business overall, as well as for business security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With increasing digitalization and more internet-connected devices in the workplace, businesses must step up their endpoint protection.<\/p>\n","protected":false},"author":2552,"featured_media":43658,"template":"","coauthors":[3673],"class_list":{"0":"post-43657","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-digital-transformation","7":"emagazine-category-endpoint-security","8":"emagazine-category-enterprise-cybersecurity","9":"emagazine-tag-endpoint-detection-and-response"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/explaining-endpoint-detection-response\/43657\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/43657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/43658"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43657"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=43657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}