Devices can be compromised
In today’s world, devices have many uses, with schoolkids to retired people all using devices for day-to-day activities. As well as individuals, most enterprises use devices to make their lives easy. Many users use multiple devices for different purposes. Devices range from workstations, laptops, and mobile devices to wearables, Internet of Things (IoT) devices, and assistant devices such as Alexa. These devices are primary targets for attackers. Even enterprise systems can be compromised through end devices, also known as endpoints. Due to this, a new approach was introduced for cyber security known as endpoint security. This protects endpoints from a range of attacks. The following list shows devices categorized as endpoints:
- Desktops
- Laptops
- Tablets
- Smartphones
- Servers
- IoT devices
- Point of Sales (PoS) devices
- Digital printers
- Smartwatches
- Assistant devices
Endpoints are important to monitor, as...