It’s Quiz Time! How Well Do You Know Endpoint Security Best Practices?

By on

How confident are you that you have the best security practices in place across your organization? Like most, you probably have your concerns.  Ever wonder what keeps your peers up at night and how your security practices compare to others?

We recently sponsored a SANS survey on endpoint protection and response which surveyed IT professionals who voiced concerns about their endpoints and shared best practices. The SANS Survey revealed striking results about organizations endpoint protection.

Not prepared? Lucky for you this is an “open-book” test. Find some cheat sheets and study guides below.

Report: Endpoint Protection and Response: A SANS Survey

Infographic: SANS Survey Key Findings

Blog: Top Three Ways You Can Simplify and Automate Your Endpoint  Protection, Detection and Response Capabilities

Leave a Comment

Similar articles

The authors thank their colleagues Oliver Devane and Deepak Setty for their help with this analysis. McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background ...
Read Blog
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future's version of this analysis.  Rising from the deep, Kraken Cryptor ransomware has had a notable development path in recent months. The first signs of Kraken came in mid-August on a popular underground forum. In mid-September it was reported that ...
Read Blog
A wall eight feet high with three strands of barbed wire is considered sufficient to deter a determined intruder, at least according to the advice offered by the CISSP professional certification. Although physical controls can be part of a multifaceted defense, an electronic attack affords the adversary time to develop the necessary tools to bypass ...
Read Blog