October 18, 2022 By Sue Poremba 4 min read

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time.

The risk of cyberattacks increased so much that the FBI put out warnings, calling the rise in attacks and malicious activities unprecedented. In its 2021 Internet Crime Report, the FBI revealed that it received record numbers of complaints to the Internet Crime Complaint Center (IC3).

“Among the 2021 complaints received, ransomware, business email compromise (BEC) schemes and the criminal use of cryptocurrency are among the top incidents reported,” the report stated. Phishing and its counterparts of vishing and smishing were the most popular attack vectors.

Remote work and the hybrid office have played a role in increasing cyberattacks. Employees need to be connected to the cloud and corporate network resources, but they are no longer protected by the organization’s on-premise security system. Also, personal device use is generally more accepted, and this increased use of Bring Your Own Device (BYOD) has added even more complexity to overall protection.

Threat actors are taking advantage of this new normal in the workplace. They know that most employees can no longer just ask the person in the next cubicle if they sent that email with the strange attachment and that security teams have modified their interactions with staff. Phishing and other cyberattacks are going to keep increasing until organizations address threat management — including mobile threat management — and endpoint security.

How threat management is changing

Traditional threat management systems were more like building blocks. You had what you needed and built on. Most organizations traditionally have endpoint security and threat management tools, such as firewalls, antivirus software and VPNs. Because security challenges are constantly shifting, you need to add to your existing system to increase the level of protection, which can bust security budgets. New tools must be purchased, and then these new tools need to be installed, integrated with the rest of the system and tested before they are deployed.

Read the Report

Perhaps pre-COVID systems were effective when everyone worked together in buildings tightly controlled by the IT team, and strict policies surrounding BYOD and shadow IT were easier to monitor and enforce. But that type of IT and security structure is never coming back.

Employees are coming into the network from all over the place — not only from remote locations but also from an array of devices. With the increased cyber threats and workload in IT departments, companies can no longer afford to have multiple apps for device management, security management and integrations with other providers. Instead, threat management capabilities for mobile and traditional endpoints should be integral to a modern, complete Unified Endpoint Management (UEM) solution.

Why turn to UEM

UEM brings the management, monitoring and security of disparate endpoints into a single console or a single-pane-of-glass interface. It includes everything within the network, no matter the operating system, location or type of device — including IoT devices.

A UEM system should offer the following functionalities:

•    Push updates to all devices connected to the system
•    Easy interface to manage both traditional desktop devices and any mobile device
•    Remote wipe features to protect data if the device is lost, stolen or otherwise compromised
•    BYOD that can be easily added and updated
•    Application and device management.

UEM builds on other management systems, like mobile device management (MDM), mobile application management (MAM) and enterprise mobility management (EMM). But these management tools are much more specific:

  • MDM focuses exclusively on the features allowed on mobile devices
  • MAM is designed to take a more holistic view of mobile devices to include both corporate and personal application management
  • EMM offers security and management of corporate devices including laptops and desktops as well as smartphones and tablets.

UEM in threat management

Device management is fragmented. Information is fragmented. All this fragmentation leads to blind spots in security; it is impossible to see or find everything since it is coming from hundreds of endpoints in dozens of locations. The inability to see and protect data, devices and the network increases the risks of a cyberattack and decreases the ability to respond and mitigate against threats.

The UEM brings visibility across all devices, enhancing security management. It’s now possible to set security policies for every device, including patch management, OS updates or identity/privilege management.

A lack of solid threat management across the entire infrastructure puts compliance at risk. UEM offers the security needed, especially in the mobile environment, to ensure that users remain compliant with industry and government regulatory requirements on all of their devices.

Finally, threat management requires someone to, well, actually manage devices and networks to harden them from potential cyberattacks. A large enterprise may have staff onsite to protect a hybrid workforce and hundreds of endpoints, but SMBs likely do not.

Issues like the skills shortage and burnout of security professionals limit what staff can do to protect the organization and its endpoints. A UEM solution like IBM’s MaaS360 is the answer for businesses of any size, but especially SMBs who need a tool that can scale with the growing number of devices, as well as handle all types of management services needed to keep an organization secure.

Download the Data Sheet

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today