Cybersecurity for Endpoint Devices

Many endpoint devices connect to enterprise and industrial networks today. These devices are points of entry to the network, making it vulnerable to hackers, malware and other advanced persistent threats. Clay Kobernick, director of supplier relations at Anixter, discusses hardware and software solutions and best practices to help secure your endpoint devices against cyber attacks.

For more on this topic, read our TECHbriefs on cybersecurity for endpoint devices and protecting operational technology from cyber attacks.

Transcript: Cybersecurity for Endpoint Devices

Hi, I’m Clay Kobernick.

Many cybersecurity solutions and best practices exist for computing devices such as laptops, servers, phones, and storage appliances connected to your network. But what about the sensors, surveillance cameras, access control, lighting and other IP-enabled systems in your building? These also connect to your network and make it vulnerable to attacks from hackers, malware and other advanced persistent threats.

It’s important to identify these points of entry into the network and follow the manufacturers’ hardening guides for each device. Beyond that, there many networking best practices that should be followed to make sure that your endpoint devices do not become vulnerabilities on your network.

You may also want to consider using specialized security hardware, such as deep packet inspection appliances and inline blocking tools to protect critical endpoints. These devices allow you to set traffic rules so that only appropriate communication flows through to your network. A solution like this is particularly important for devices that aren’t in a secured environment or are considered mission critical.

You should also be using a syslog manager to review your devices’ system log files on a regular basis. The data in these files reveals what normal operations on your network look like and can help pinpoint flaws or changes in operations that could signal an attack. Additional tools to help thwart an attack would be intrusion detection software, change management, and vulnerability scanners.

In the security and IoT space, many organizations are not currently utilizing their syslogs, and many endpoint devices don’t currently allow access to syslogs. This shows that end users and manufacturers are still in the process of learning and establishing cybersecurity best practices for the new endpoint devices making their way onto the enterprise network.

You can read more about this topic on anixter.com, and contact us to speak with an Anixter technology expert.

Related