Upcoming Live Webinar with LogMeIn’s CTO

From our latest research report, Uncovering the Harsh Realities of Endpoint Management, we invite you to join our live webinar and Q&A session on August 1st at 11AM with LogMeIn’s Chief Technology Officer, Sandor Palfy, and Director of Product Marketing, Rachael Stockton. We’ll be diving into specific trends in the technology space and what it all means to you as an IT professional.                                                                                                                                                                                                                                                                    Attend this webinar to learn:
  • How endpoint management has evolved and why having a comprehensive endpoint management solution is no longer a nice-to-have but rather an absolute necessity.
  • Market trends and business threats driving the need to change our approach from reactive to proactive to keep our organizations secure.
  • How to implement proactive measures to manage and project your endpoint infrastructure from cyber-attacks.

Register here: https://attendee.gotowebinar.com/register/7459720592977017346?source=blog

Sandor has over 18 years of experience in the technology and development sector – if you have any questions for him about the endpoint management landscape, email them to us, and we’ll try to cover them during the session!
         

Uncovering the Harsh Realities of Endpoint Management

The workplace is evolving, and cybersecurity concerns and the risk of security breaches are higher than ever. According to the Ponemon Institute, 54% of companies experienced one or more successful attacks that compromised data and/or IT infrastructure in 2018, proving that the majority of today’s organizations are struggling to secure their endpoints. For many, endpoint security risk has become unmanageable, and companies are paying a prohibitive cost for each successful attack – $5 million for a large organization or an average of $301 per employee.

From the biggest ransomware attack in history (WannaCry) to two security vulnerabilities that put nearly all operating systems and computers at risk (Spectre and Meltdown), IT professionals are on high alert to improve their security measures, but many are struggling to determine how to implement proactive measures to manage and protect all endpoints from cyber-attacks.

In our latest research study, we surveyed 1,000 IT professionals across North America and Europe about the security landscape and uncovered market trends and business threats driving the need to make endpoint management a top priority. We revealed current tactics and proactive measures IT professionals can take to better protect their organizations from breaches.

To learn more, check out the infographic below, and download the full report here:

 

         

Solving for a Lack of IT Visibility & Control

Technology is a double-edged sword for IT. On one hand, it makes life easier with instant access to information, eliminates traditionally manual tasks, and allows us to better protect and manage the IT environment. On the other hand, it’s given a new life to rogue employees who can sign up for accounts and conduct business completely outside of IT’s line of sight and certainly out of their control.

You can’t protect what you can’t see. That is the elusive problem known as shadow IT. The challenge is gaining visibility into this hidden world, knowing the applications that are in use, and protecting company data without impacting the employee’s productivity.

This problem is largely based on the use of employee-introduced, non-sanctioned cloud apps. Last October, Ovum released research finding that 78% of IT executives say they do not control all the cloud apps their employees use for work, and a quarter say they only control half of the cloud apps being used through the organization.

With no oversight of these apps, there is little protection against the exposure of sensitive corporate data, with an unknown quantity of touch points and security behaviors outside the control of the IT team. Companies must put the right policies and technology in place to address password problems, without becoming the enemy of the employees.

Almost 68% of those surveyed by Ovum acknowledged that these open doors open the company to significant risk, whether that’s a phishing attack, ransomware, or social engineering attack. However, the challenge is how to address these risks without taking up even more time of the IT team’s already full plate.

How IT Can Take Back Control

While it can appear overwhelming to tackle the problem of shadow IT within your business, it doesn’t have to be. To help you approach this problem, we’ve provided three critical steps to get you started on taking back control of the apps and security of your organization:

  • Audit your employees’ cloud apps – As we said before, you can’t protect what you can’t see, and the first step to seeing all the apps in use is to ask. Do an audit of all the apps and tools that employees are using through a survey. Even if you don’t capture everything, you’ll learn about many of the tools in use and raise awareness with employees that IT needs to be in the loop as they bring in new apps. Once you have a clearer picture of your business’ app ecosystem, start to consider Single Sign-On and password management tools to give you management over those apps that give you visibility into usage and allow you to enforce policies that keep those accounts more secure.
  • Setup automated software updates – Don’t get caught with outdated software, which was the catalyst for the Equifax breach back in September 2017. This is an easy fix. Leverage endpoint management technology like LogMeIn Central, which enables you to pair the ability to push patch updates, with the ability to automate the process and setup alerts so a service is never outdated for long.
  • Require multi-factor authentication (MFA) – If you haven’t already, introduce your employees to multi-factor authentication. Start with your user directory, whether it’s Active Directory, Azure or G-Suite, and require employees to add this second layer of protection to the account. Once employees are comfortable with MFA on their email, they’ll be more comfortable adding it to other apps as well.
         

New LogMeIn Pro Status Page Now Live

 

Busy professionals rely on LogMeIn Pro to securely remote into their computers and get their work done from anywhere. Because reliable connectivity is a crucial aspect of remote access, we’ve built LogMeIn Pro with security being the most important design objective. Today, as a further commitment to our customers, we announce the launch of a new status page to keep you fully informed of our service status and historical up-time.

Visit http://status.logmeinaccess.com/ to view our status page that shows the current state of the LogMeIn Pro service. Powered by Atlassian’s monitoring  service https://www.statuspage.io/ our administrators and users have access to the #1 status and incident communication tool.

We’re committed to keeping your connections completely secure and reliable, and we’ll always keep you fully informed regarding any product incidents and updates. For real-time updates, be sure to subscribe to receive notifications via email, text or phone.