An endpoint is a remote computing device that communicates back and forth with a network to which is it connected. Examples of endpoints include:
>> Desktops
>> Laptops
>> Smartphones
>> Tablets
>> Servers
>> Workstations
Endpoints represent key vulnerable points of entry for cybercriminals. Endpoints are where attackers execute code and exploit vulnerabilities, and where there are assets to be encrypted, exfiltrated or leveraged. With organizational workforces becoming more mobile and users connecting to internal resources from off-premise endpoints all over the world, endpoints are increasingly susceptible to cyberattacks. Objectives for targeting endpoints include, but are not limited to:
>> Take control of the device and use in a botnet to execute a DoS attack.
>> Use the endpoint as an entry point into an organization to access high-value assets and information.
>> Access assets on the endpoint to exfiltrate or hold hostage, either for ransom or purely for disruption.