{"id":2326,"date":"2015-11-26T02:06:34","date_gmt":"2015-11-25T18:06:34","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=2326"},"modified":"2015-11-26T02:06:34","modified_gmt":"2015-11-25T18:06:34","slug":"a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/a-thanksgiving-example-of-the-impossibility-of-securing-the-endpoint\/","title":{"rendered":"Securing the Endpoint: A Thanksgiving Example of its 100% Impossibility"},"content":{"rendered":"

Brian Krebs, whom we believe to be the Bob Woodward of cyber security and bank account hacking reporting, broke a pretty amazing story yesterday about how hard it is for companies to effectively secure (and keep secure) their network endpoints. It’s a tale of a big breach at a sophisticated firm that SPECIALIZES in remote network and PC employee security. Yes, that’s right. A protector against remote hacking was hacked at the endpoint in a BIG way.<\/p>\n

Here’s Krebs’ headline with a link to the story.<\/p>\n

Breach at IT Automation Firm LANDESK<\/a><\/p>\n

Here’s how Krebs sets up the story:<\/p>\n

LANDESK, a company that sells software to help organizations securely and remotely manage their fleets of desktop computers, servers and mobile devices, alerted employees last week that a data breach may have exposed their personal information. But LANDESK employees contacted by this author say the breach may go far deeper for the company and its customers.<\/p><\/blockquote>\n

To give the story its full justice we encourage you to read Krebs’ telling of it. But, in terms of major bullet points consider the following:<\/p>\n