“IT Security’s Weakest Link”: The Endpoint Security Problem

By now, almost everyone knows that the easiest way for a hacker to get into a corporate or institutional network is by compromising one of its endpoints. Endpoints are simply those devices (computers, smartphones, tablets) connected to a network. Cyber criminals have many ways to take administrative control of these endpoints. Often they use phishing … Continue reading “IT Security’s Weakest Link”: The Endpoint Security Problem