{"id":29704,"date":"2017-05-16T14:24:54","date_gmt":"2017-05-16T14:24:54","guid":{"rendered":"http:\/\/greenpages.com\/?p=7092"},"modified":"2017-05-16T14:24:54","modified_gmt":"2017-05-16T14:24:54","slug":"endpoint-protection-stopping-attacks-like-wannacry","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/endpoint-protection-stopping-attacks-like-wannacry\/","title":{"rendered":"EndPoint Protection: Stopping Attacks Like WannaCry"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-7094 size-full\" src=\"http:\/\/greenpages.com\/wp-content\/uploads\/iStock_000020042572XSmall-e1494875403378.jpg\" alt=\"Endpoint Compliance\" width=\"300\" height=\"225\" \/>In the past few days, the WannaCry ransomware has attacked organizations all over the globe, in over 100 countries. It is believed to be the biggest attack of its kind ever. The malware enables the attacker to target endpoints without the users\u2019 knowledge, which is exactly why endpoint protection is so crucial. This is causing massive issues in businesses all around the world. As of Sunday,<\/p>\n<p><a href=\"https:\/\/securityintelligence.com\/wannacry-ransomware-spreads-across-the-globe-makes-organizations-wanna-cry-about-microsoft-vulnerability\/\">\u201cMore than 130,000 systems have already been compromised.\u201d (Kessem, 2017)<\/a><\/p>\n<p>Using a network monitoring tool is an ideal way to classify every PC, tablet, and smartphone on your network to determine if they are safe or not. An agentless monitoring tool gives your company the ability to see and control managed, unmanaged, and IoT devices. \u00a0In addition, 99% of computers are vulnerable to <a href=\"https:\/\/heimdalsecurity.com\/blog\/10-surprising-cyber-security-facts-that-may-affect-your-online-safety\/\">exploit kits<\/a>, making unmanaged computers a serious threat to your network. The number of data breaches is growing exponentially, with more advanced malware and technology making it easier for hackers to get inside.<\/p>\n<p><em>[<a href=\"http:\/\/response.greenpages.com\/Security0916-BlogRECORD\"  rel=\"noopener noreferrer\">Download Our Webinar<\/a> on 20 Critical Security Controls Every Modern Company Should Have]<\/em><\/p>\n<h2>The Importance of Endpoint\u00a0Protection<\/h2>\n<p>This is why a powerful endpoint compliance strategy is so crucial. There are no endpoint agents required for network access control authentication, which enables seamless visibility of every device and type connecting to your network. Network Access Controls can also help you detect and take action against suspicious endpoints the instant they access the network. It can also protect you against hacked Internet of Things devices, such as the Nest Thermostat, Phillips Hub, smart microwaves, smart ovens, security cameras, and much more. With hundreds of different, unsecured IoT devices connecting to your networks, it is vital for your company to know what they are. Using an agentless technology can help you discover, separate and assess devices on your network. Check out this great in-depth article on <a href=\"http:\/\/www.networkworld.com\/article\/3157762\/security\/endpoint-security-in-2017.html\">Network World<\/a>.<\/p>\n<p><em>Interested in learning more about how to protect your company? <\/em><\/p>\n<p><em><a href=\"http:\/\/response.greenpages.com\/Security0916-BlogRECORD\"  rel=\"noopener noreferrer\">Download our webinar<\/a> recording on 20 critical security controls and learn what you can implement to gain understanding into the security of your environment and protect your company<\/em><\/p>\n<p>By <a href=\"http:\/\/www.linkedin.com\/in\/cryanjake\"  rel=\"noopener noreferrer\">Jake Cryan<\/a>, Digital Marketing Specialist<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=pj-Vr5FqTpI:iBm-rxRExvc:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=pj-Vr5FqTpI:iBm-rxRExvc:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=pj-Vr5FqTpI:iBm-rxRExvc:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=pj-Vr5FqTpI:iBm-rxRExvc:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=pj-Vr5FqTpI:iBm-rxRExvc:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=pj-Vr5FqTpI:iBm-rxRExvc:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/JourneyToTheCloud\/~4\/pj-Vr5FqTpI\" height=\"1\" width=\"1\" alt=\"\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the past few days, the WannaCry ransomware has attacked organizations all over the globe, in over 100 countries. It is believed to be the biggest attack of its kind ever. The malware enables the attacker to target endpoints without the users&rsquo; knowledge, which is exactly why endpoint protection is so crucial. This is causing&#8230;  <a href=\"http:\/\/greenpages.com\/featured\/stopping-wannacry-endpoint-protection\/\" title=\"ReadEndPoint Protection: Stopping Attacks Like WannaCry\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[179,1546,3327,4506],"tags":[118],"class_list":["post-29704","post","type-post","status-publish","format-standard","hentry","category-featured","category-it-security","category-networking-security","category-ransomware","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/29704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=29704"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/29704\/revisions"}],"predecessor-version":[{"id":29705,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/29704\/revisions\/29705"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=29704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=29704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=29704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}