Chapter 8. Protecting the Endpoint
In This Chapter
Understanding why the endpoint is such a risk and therefore a good place to start
Developing a strategy to deal with laptops
Appreciating where encryption can help in your quest
Defeating the keylogger
Fighting cyber-criminals with the top 10 products to protect the endpoint
When you're looking at the data-leak problem (or any problem, for that matter), there comes a time when you must make a start. Being faced with a blank sheet of paper is the toughest part for any writer; it's the same when you're looking at preventing data leaks. The task ahead seems immense, there doesn't appear to be a good place to begin, and (more to the point) there doesn't seem to be an end in sight.
With that in mind, here's the start: the endpoint.
Why the Endpoint Is a Risk
The endpoint is basically the desktop, the laptop, or other end-user device; these days it could easily be the mobile phone or PDA/Smart Phone.
The potential problem here is inadvertent loss of these devices, especially the easily portable ones (as Figure 8-1 illustrates).
The server is not commonly an endpoint because the user isn't sitting in front of it all day (as is the case with laptops, desktops, and mobile devices). Servers tend to live in the data center, and are subject to their own risks (as Chapter 14 describes). The endpoint has the most risk because it's where the user is.
Although people are your greatest assets, they're also the biggest weakness — not because they want to make ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access