Security Layer 6
COMBATS : DEVICE COMPROMISE | MALWARE | UNKNOWN USB DRIVES
End-users’ curiosity is a risk factor in itself. Forever seeking connectivity,
users will often connect to any available network without considering
They’ll also click on unknown links, fall victim to phishing emails, download applications from an untold number of vetted sources and, worst of all, insert unknown USB drives into their machines. These endpoints then become attack vehicles leveraged to penetrate your defenses.
Safeguard these endpoints (e.g., laptops, computers, servers, etc.) — and
protect users from themselves — with next-generation antivirus (NGAV)
solutions or an endpoint protection platform (EPP).
But one of the most critical best practices is to use device control capabilities
to stop unknown USB keys from connecting to the endpoint. With SonicWall
Capture Client, for example, administrators can create customized policies
for known and unknown USB devices. For instance, they could allow all mice
and keyboards, but block unknown USB keys while allowing approved or
Once in place, endpoint protection will help you monitor and mitigate
cyber attacks that compromise an endpoint, ensuring malware can’t laterally
spread through your network or organization. The EPP has two roles: first, it
serves as your last line of defense within your network and should provide
additional sand boxing capabilities and security policies; second, it is your
first line of defense on mobile computers and should have the ability to be
The more advanced endpoint security solutions will also feature automated
‘rollback’ controls to help administrators return a compromised device or
machine to a safe state.
See how the experts at CisCom can help you with this and more!
Blog content for the Modern Layered Security series provided by our partners at SonicWall.