© Nihad A. Hassan 2019
N. A. HassanRansomware Revealedhttps://doi.org/10.1007/978-1-4842-4255-1_4

4. Endpoint Defense Strategies

How to Protect Endpoints from Ransomware Attacks
Nihad A. Hassan1 
(1)
New York, USA
 

Ransomware attacks can hit almost any type of computing device, but endpoint devices still receive the largest number of ransomware incidents. Since the early days of the Internet, securing endpoint computers has always been considered the first line of defense against malware attacks (aside from firewalls and antivirus software).

Endpoint security is a term used to describe all technologies used to protect endpoint devices (or end-user devices) from cyberattacks. Securing endpoint devices is a key to protecting an entire enterprise’s network ...

Get Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.