While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to the fifth annual State of the Endpoint study conducted by Ponemon Institute and commissioned by Lumension. Endpoint security threats have become more difficult to stop or mitigate in the last two years, say 71% of the 676 IT and IT security professionals responding to the study. Topping the list of this year's greatest risks is mobile devices. 75% said mobile devices pose the biggest threat in 2014, up from just 9% in 2010.
Often times when we talk about Targeted Threats, or what are called Advanced Persistent Threats (APTs) we tend to analogously use the term targeted threat with the actual malware that's being loaded onto our systems. And we think the targeted threat is the malware on my system.
But in reality what we need to understand, and get a real grasp on, is that these targeted threats use a very robust and we defined methodology or framework for how the attackers are actually going through the process of: identifying you as a target, installing malware, gaining a foothold and spreading laterally.
Visit www.lumension.com/apt-framework to take your first step against targeted threats.