2 hours 27 minutes
welcome back to intermediate endpoint security course. And in this lesson, I'm going to talk about the importance of endpoint security. And why are the pieces and all books the most attack part of fighting system
so vital importance of endpoint security.
is there I mean, the importance of endpoint security so vital because endpoint is now the weakest link in I t. Security in many companies.
Because people are protecting their networks, their routers, They have harder firewalls. They have servers with softer,
and they feel brother protected because they have built. It's like having a medieval fortress, and you build a big wall around it and you have people manning the wall and, uh, you feel safe. However, um, endpoint, meaning PCR printer
is highly one larible device
for many reasons.
One of the reasons is because it's handled and it's operated by people who have no knowledge or very little knowledge about security,
so they can be easily fooled to do things that will breach that security and very serious way.
the reason why endpoint security is so vital and important because it actually requires engagement of all employees in the company and over tickles.
It is not enough for I t. Security to define practices and things that have to be down and authority to implement it.
If, for example, nobody has trained the employees about things that they simply shouldn't do. For example, if somebody gives you in the years be you don't put it in your PC because that USB mind contained virus or malicious code.
Um, then the final reason is because people are not taking care of security or their own PC's. They think that that is a thing that they can leave to somebody else like I t security alrighty people, which they don't, by the way.
Then the hackers have found out that this is the weakest spots today in in a company, and they are using a lot off efforts to find a way to compromise endpoint and to make it a better ah, backdoor or to install some malicious software on it
and in that way, to attack a company. So,
again, no matter how you secure your network, no books can get attacked when users take them home because somebody can compromise, for example, their Internet connection,
or they can get attacked during a business trip. Or they can get back during meetings with customers that their company
and phishing attacks. Tech Holding, please. And the fishing male gets true.
If you have a lot of people who have received that mail, you can make sure that somebody will click on billing
if nothing else, from the sheer curiosity. So some people if they had training, if they know that this is dangerous, they still do because they are
very curious or they just don't care.
So in this video, you have learned about wise and point security so important today and some challenges regarding security of PCs and printers and in next lesson, I'm going to talk about which endpoint devices are we going to cover in this course?
Intermediate Printing Security
The Intermediate Printing Security course is intended for IT and cybersecurity professionals that want to ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Intermediate PC Security
The Intermediate PC Security course will teach students about endpoint protection. Students will learn ...
4 CEU/CPE Hours Available
Certificate of Completion Offered