We all know that from an attack service surface, endpoints are vulnerable, especially with all the remote users that are out there. This talk will be about considerations for the endpoint and may not have the answers you are looking for, however you will walk away with some heavy thinking to do on the following:
- Remote (home), Remote (co-work space), Office (wireless, printers, etc.)
- Tips to mitigate the attack surface (To split tunnel or not split tunnel, that is the question!?)
- How often do you test the endpoints? Have you tried to send in malware (from something easy like the SET toolkit) into your endpoints?
- Ways to generate this malware to see how well it works
- Other attacks like phishing
Can you see up BeEF and then attack your endpoints?