You are on page 1of 8

Top 10 Endpoint Security Best

Practices for Implementation and


Management in 2021
 
After the onset of the COVID-19 pandemic, companies have started
embracing remote work on a large scale. As a result, more people are
working outside traditional offices. Such a working environment is
exposing more and more endpoint devices that are now acting as the
biggest potential weaklings in secure networks.

 
According to a 2020 report released by the Ponemon Institute, around 68%
of companies suffered more than one endpoint attack in the last 12 months
alone.

 
Endpoint devices provide a backdoor entry to unauthorized access by
external actors. Thus, the system is of paramount importance for
organizations that want to safeguard their networks from potential security
breaches. Here are the top best practices that companies need to employ
while deploying endpoint security.

 
 
Endpoint Security Best Practices
 

1. Secure every endpoint on the


system
 
Endpoint devices act as a gateway to your network. Hence, securing and
keeping track of each and every device that connects to your system can
serve your enterprise well.
 
Organizations can maintain an inventory of all endpoints in a network
and update it when new devices are connected to it. Additionally, they
need to ensure that each endpoint device is equipped with the requisite
safeguards to keep them safe from security threats and thereby apply the
latest patches as per the need.

2. Enforce stronger password policy


& endpoint encryption
 
Once the endpoint devices become secure under the ambit of endpoint
security measures, companies need to encourage their users to
exercise good password practices.
 
Companies can make long and complex passwords a mandate for all their
users. They can also encourage the practice of periodic password changes.
Also, the habit of reusing old passwords should be banned by
organizations. Beyond passwords, companies may need to add an
additional layer of protection through encryption.

 
One of the best practices could be to encrypt the endpoint’s disk or
memory. This ensures that the device data remains unreadable or
inaccessible when it is transferred to another device or is safe even if the
device is stolen or lost.

 
3. Enforce least privilege access
 
Limiting access and device privileges is a good practice to ensure the
security of the endpoints. Admin privileges should not be assigned to
regular users. Such a least privilege access policy can prevent
unauthorized users from loading executable code onto the endpoints.
 

4. Leverage SIEM tools and run


endpoint scans regularly
 
Endpoint security solutions should readily leverage security
information and event management (SIEM) tools to enable real-time
monitoring of the network. With the growing count of endpoint devices,
SIEM solutions are now a part of company standards to enforce overall
security. A good SIEM solution should log all network events. It should
also have policies in place that can flag potential incidents and take action
against them immediately.
 
Besides, regular endpoint scans can allow organizations to keep track of
all devices connected to the network in real-time. This can be further
enhanced by employing constant location awareness practices for endpoint
devices such as smartphones and tablets that are vulnerable to loss or theft.

5. Implement automated patching


 
Endpoint security is effective with automated patching practices. With
these, you can dynamically push patch updates during downtimes.
Organizations need to take care that such automated systems also apply to
third-party patches.
 
According to a study by the Ponemon Institute, 60% of breaches identified
in 2019 were due to unpatched software. Here, the vulnerabilities were
known, but the required patches weren’t applied.

6. Practice strict VPN access policy


along with MFA
 
Today, as the task force turns to the remote work model, VPNs are being
extensively used by most corporate companies. However, VPNs remain
exposed to spoofing, sniffing, DDoS, and other external attacks.

 
Thus, it is more appropriate to limit VPN usage, thereby allowing VPN
access only at the application layer. This can narrow down the network-
level security risk considerably.

 
Besides, implementing multi-factor authentication (MFA) can prevent
account theft from different sources. Also, introducing a secondary layer
of verification, when the system identifies a log-in from unrecognized or
unknown locations, can enhance overall security.
 

7. Manage BYOD cases judiciously


 
While allowing employees to use their own devices, companies should
have policies that outline the requisite security protocols. Organizations
can also consider utilizing a guest access account policy in many cases.

 
Enterprises should emphasize and focus on making end-users aware
of their responsibilities and remind them of the rules pertaining to
device loss or theft. A weak or faulty BYOD policy can cost companies
billions of dollars as users can hack into the organization’s network using
their own devices.

 
A similar case was observed in 2017 when a data breach of South Korea’s
largest bitcoin exchange occurred. An unclear BYOD policy led to this
incident, where $30 million (in cryptocurrency) was stolen in just a few
hours and compromised the data of around 32,000 users.

8. Practice system hardening and


use cloud storage cautiously
 
Organizations can limit access to the device’s configuration and
settings to cut down on IT vulnerabilities, attack surfaces, and
potential attack vectors. System hardening can set a benchmark for
different devices and operating systems. It can also define traffic
pathways between endpoints and the network. As a consequence, all
the other open ports (UDP or TCP) can be closed.

 
Additionally, companies need to remember that the cloud acts as another
endpoint that is easily accessible to external entities. Hence, providing
distinct credentials for each user is essential. Also, using TLS (HTTPS) to
transport data should be standard practice.

9. Implement granular application


control
 
Implementing this security practice will allow you to focus on restricting
unauthorized application executions that present a risky element to the
organization’s security.

 
Companies can use application control programs that limit app executions
based on factors such as hash, path, or publisher. They can maintain a list
of programs, files, and app executions that are permissible. Besides, while
an application is granted access, ensure that you also implement rules that
block communication to other irrelevant network segments.

 
10. Practice network segmentation
 
The overall performance of an endpoint security solution can be
doubled if you split your network into sub-networks.

 
This can be started by setting up a privileged area and establishing a
well-defined system with a privilege hierarchy. You also need to be
mindful of interpersonal, interdepartmental dependencies, and
organizational factors while segmenting the network. This will ensure that
regular business processes are not affected. Also, managing and updating
privileged resources should be done regularly.
 
The U.S. Department of Homeland Security regards network segmentation
as a standard security practice that plays a pivotal role in any
organization’s network security.

You might also like