Human error and new business practices – especially those related to remote access and mobility – are often blamed for cybersecurity failures. The security of your workstations is becoming a major and sensitive issue because it affects the IT health of everyone in your company.
Any of your employees, while sitting calmly at their workstation, can act in a way that causes an infection or compromises your data. How? For example, just by clicking a corrupted link in an email (phishing). Lack of attention, carelessness or a unconsidered click, and the front door to your system is wide open.
Regardless of the form of the cyber attack (spear phishing, watering hole, etc.), the basic method remains the same: tricking one of your employees and leading them, without their knowledge, to commit an action that will install malware on their workstation and provide access to your network.
Although the Internet remains the most prevalent vector for computer threats, you must also protect your network from the risks of infiltration or malware infection presented by removable media: USB keys or external disks, as well as the mobile workstations of your employees, or even your service providers. After all, if they fail to follow the essential rules of good IT hygiene, remote employees increase the risk of infection for their equipment.
Removable media, by their very nature, are designed to be installed and then connected, disconnected and reconnected to different computers according to users’ needs, to exchange data. And in doing so, they can potentially transmit malware to various devices, which are themselves connected to the company’s network and can pass on infections.
In the course of their duties, mobile employees are required to work with their laptop, tablet or mobile phone, involving connections in locations that offer varying levels of security. This is particularly true when using a guest’s internet network (which can be shared with other entities), their home internet network or open Wi-Fi networks (in a cafeteria or hotel, etc.).
Their connection can then be intercepted, exposing their data to theft or making their computer a target for malware. In the latter case, there is a danger that the employee may spread malware to the company’s computer network when logging in again with the infected computer.
To address these issues, our teams have developed the Stormshield Endpoint Security (SES) range. This standalone protection is capable of dynamically adapting its security operations according to its environment. And at the same time, it analyses access to applications and company resources in response to the location of the workstation.
Any doubts about the last e-mail you received? Especially about the file attached? Use Breach Fighter Portal, a free tool that detects possible malicious behaviour in the files you receive.
This malware detection service is an integral part of our Breach Fighter sandboxing solution. A solution based on behavioural analysis from our Stormshield Endpoint Security Evolution product and research from our Cyber Threat Intelligence team. Breach Fighter can analyse and detect malicious behaviour in emails containing attachments and in files such as Microsoft Office, PDF, JAR and Java files, scripts (Powershell, Jscript...), Windows executable files, and archives (ZIP, RAR, 7zip...).