ASKME.Bar is an online community where anyone can get their desire solution for any technical problems by certified professionals. If anyone can join our expert panel then sign up our online community at

Author Topic: How to Protect 3 Overlooked Endpoints for Cyber Attacks  (Read 698 times)


  • Full Member
  • ***
  • Posts: 144
  • Karma: +0/-0
    • View Profile
    • PCTECH24AU - Premium PC Support Service Provider Company
Most of the organizations think that they have covered their endpoint security with antivirus software and other cyber security program.  Most of the users and organizations think that they are not at risk of an endpoint-initiated attack if they have installed security software. In a report it was found that more than 70 percent of the top security vulnerabilities stay there within user systems which make endpoint the most common point to initiate end-point attack. Even if you believe that you have covered all the end-points against breaches, there are three common end-points which most of the people overlook. If you overlook these end-points, they may be the biggest vulnerabilities in your network:


A router works as a direct entrance to a network, so if you haven’t activated security on it, it may bring trouble for your business. Once hackers manage to compromise your router, they may change your router’s settings and allow malware to attack on your network and system to gather your personal and corporate data. They will particularly target your sensitive information and financial account information. Install the protection of a potential security program to find DNS-changing malware in router. Such infections may direct you to spoofed pages of third-party sites. The sad part of such attacks is that victims notice such things once their money has been snatched from their account.

Hackers know the tricks to easily bypass the authentication measures and predefined credentials of your router with web-based scripts and brute-force attacks. These issues are more prone and likely to happen if you are using these default passwords. It is better to remove backdoors before it's too late. Home users and businesses should use a complex key which is a combination of at least one number, one uppercase letter, and a special character. IT admins should implement security tools which can track if any flag suspicious actions or unusual activity happens. Beyond using strong passwords and encouraging standard password hygiene, organizations need to quickly respond in the event of an attack.

Mobile devices

Employees as well as organizations are focusing more on connectivity, convenience and flexibility and mobile devices are the clear answer to those requirements. Many organizations are allowing workers to use their personal smartphones and tablets for official work and they have established a policy to bring-your-own-device for the same.

This is an appreciable effort, but it may also initiate and introduce security vulnerabilities if you are not able to manage, update, and secure properly. Therefore, it is the moral responsibility of an organization to take measures to ensure that a compromised device doesn't lead to a breaching event. To cover potential vulnerabilities, it is important that device owners as well as organizations keep their device's operating system and applications updated.

Problems due to outdated operating systems and malware may be avoided though, but when considering third-party applications, a number of issues come up. There are many apps which are failed to use the Transport Layer Security protocol, which means such apps will allow man-in-the-middle attacks which could easily result in data theft. Company IT teams need to thoroughly vet programs before giving them approval to be used in an organizational environment. It team need to educate employees about which programs and websites are not safe to use. A corporate-owned, personally enabled plan may provide better output in terms of convenience without sacrificing security.

Printers and fax machines

Printers and fax machines are used occasionally and stationed in a corner often. Hackers know it very well that when it comes to endpoint security, people usually ignore these machines. Unattended and irresponsible approaches make these machines more vulnerable to cyber attack events.  The risk of such attacks increases when employees access them via the cloud. More vulnerability will emerge if you will hook up your printer to the internet via unsecured connections.

Organizations need to take some time to figure out important aspects like monitoring any unusual behaviour, ensure connection security, and configure these devices appropriately. To detect if these non-PC-based machines are compromised, network intrusion prevention systems and database security solutions may prove helpful as they may allow you to quickly respond to the issue.

As IT infrastructure is becoming more complex, it is likely to happen that organizations will overlook critical endpoints as far as security is concerned. Mobile devices, printers and routers are very crucial and important parts of corporate environment; still they are the least secure endpoints. In order to mitigate vulnerabilities, organizations need to configure protection settings on these hardware and install cyber security tools to figure out potential risks and challenges.

Technical Questions & Answers


Sitemap 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 
Legal Disclaimer: All registered trademarks belong to their respective owners. The use or mention of any trade name, product name, or trademark in this website is in no way intended to suggest that the trademark owner is at all affiliated with or endorses this site.

Terms & Condition | Privacy Policy