Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
SPEAKER_01 (00:27):
And welcome to
Technology Tap.
I'm Professor J.
Rod.
In this episode, EndpointSecurity.
Let's tap in the Mikro.
(01:06):
Welcome back to Technology Tap,where we break down the
technology shaping our world,past, present, and future.
I'm your host, Professor J.
Rod, and today we're walkinginto the frontline security of
cybersecurity, not the cloud,not data center, not big
corporate firewalls.
Today we're stepping ontoendpoints.
(01:26):
The device in our hands and onour desk and in our pocket.
Because in modern cybersecurity,every endpoint is a battlefield.
In this episode, Endpoints onthe Fire, the modern battlefield
of security, we are going totalk about all different types
of endpoint security here onTechnology Tap.
(01:48):
What is an endpoint?
The new attack service.
Long ago, cybersecurity defensewere simple.
Build a big wall around thenetwork, keep the bad actors
out, but that world is gone.
Today, everyone carries acomputer, phones, laptops,
tablets, smartwatches.
Everyone connects from airports,hotels, coffee shops,
classrooms.
Everyone stores data, photos,contracts, credentials,
(02:12):
conversations.
And every one of them is anendpoint.
Endpoints are now the firsttarget, the weakest link, the
richest source of data, and theplace where attackers strike
first.
Attackers don't storm datacenters anymore.
They fish you, they exploit yourphone, they brute force your
workstation, they bypassfirewalls altogether by going
(02:34):
straight to the human and thedevice.
This is why endpoint security isimportant.
Hard coding is the art of takinga device and making it less
convenient for the attacker andmore secure for the user.
Let's break down thefundamentals.
1.
Operating system security.
Every OS, Windows, Mac, Linux,Android provides built-in tools
(02:59):
for security.
But out of the box systems areoften too permissive.
Hardening includes applyingupdates, disabling guest
accounts, enforcing passwordcomplexity, enabling firewalls,
blocking unsigned drivers.
A simple patch could haveprevented the famous WannaCry
ransomware attack.
One single patch.
(03:20):
But unpatch Windows Endpointmade it explode globally.
2.
Work stations and servers.
Work stations need strong localaccount policies, software
restriction policies, USBcontrol, application allow
listing.
Servers need even more.
No unnecessary services, no GUIwhen possible, strict RDP
(03:43):
controls, hardening networkroles, servers are treasure
chests, workstations are opendoors.
Both must be fortified.
3.
Baseline configurations.
Think of these like a goldenimage.
A baseline includes enabledsecurity services, hardening
(04:05):
network settings, limited adminaccounts, restricted ports,
mandatory encryption,pre-configured logging.
If something changes, you knowimmediately because baselines
tell you what normal looks like.
Number four, services, ports,and interface.
Every open port is a possibleattack route.
Port 22 SSH, port 3389, RDP,port 445 SMB, port 80, 443, web
(04:33):
traffic.
Attackers scan these constantly.
Hardening means close what's notneeded, restrict what remains,
monitor everything.
If hardening is preparation,endpoint protection is defense
in action.
Let's break down the fivelayers.
1.
Segmentation and isolation.
Networks that are segmented,they have limited lateral
(04:56):
movement, contain infections,protect high-value assets.
Example, if finance andmarketing are separated, malware
and marketing cannot jump tofinance.
Segmentation saves companiesfrom total collapse during the
not pay to attacks.
Isolation saves them today.
Number two, antivirusanti-malware.
Today AV is AI-driven behaviorbased cloud powered.
(05:20):
It doesn't just look for knownsignatures, it looks for
suspicious behavior, patterns,memory injection, fowless
activities.
A V is no longer a program, it'sa system.
Disk number three, diskencryption.
If your laptop is stolen andit's not encrypted, your data's
gone.
FDE, full disk encryption,protects everything.
(05:42):
BitLocker for Windows, 5V forMac OS, iOS automatic
encryption, Android FDE.
If the hardware is stolen, thedata stays protected.
4.
Patch management.
Patch or perish.
Unpatched third-party software,Java, Adobe, Reader, Chrome,
creates more breaches than OSvulnerabilities.
(06:05):
Patch management is a lifesupport for the system.
Old antivirus was reactive.
Advanced protection is predictpredictive.
Let's walk through thetechniques.
Endpoint detection and response.
EDR does four things.
One, collects data continuously,the detects abnormal behavior, C
(06:29):
blocks threats, four, helpsanalysis investigate.
It is the standard forenterprise defense.
Extended detection and response.
XDR expands EDR acrossendpoints, networks, cloud
services, email, identity.
One unified system, one unifiedalert system stream, one unified
(06:51):
response engine.
User and entity behavioranalytics.
Instead of scanning for malware,it scans for weird behavior.
A user logging in at 3 a.m.
A service account downloadinggigabytes of files.
An employee accessing HR datawhen they never do.
UEBA doesn't just ask, is thismalware?
It asks is this normal.
(07:14):
HIDS and hips.
HIDS detects detects attacks,hips, blocks attacks.
Think of them as smoke detectorsand sprinklers.
Both are vital.
Attacker loves privileges, sothe defense is simple.
Least privilege.
Users only get what they need,no more.
(07:35):
No admin rights, no unnecessaryinstart installers, no unmonitor
privileges.
ACL and file permissions.
ACL protect files, folders,device, shares.
Misconfigured ACLs cause moredata leaks than malware ever
has.
Application allow listing.
(07:55):
The most powerful securitycontrol in the world is simple.
Only approved apps can run.
No unknown software, nomalicious executions, no shadow
IT.
Allow listing stops attacksbefore they start.
Monitoring and group policy.
Endpoint management tools likeIntune, JAMF, Group Policy,
(08:15):
MDMs, force securityautomatically.
Humans forget.
Systems don't.
The mobile endpoint explosion.
Walk into any cafe, any airportterminal, any campus hallway.
You see it instantly.
Hundreds of tiny supercomputers,all online, all storing personal
(08:38):
and corporate data, allconnected to the wireless
networks you have no controlover.
Smartphones are GPS trackers,corporate email clients, payment
devices, cameras, multi-factorauthentication tools, personal
votes, and because they carry somuch, they are now one of the
most targeted endpoints in theworld.
Mobile device has three uniquechallenges.
(09:08):
Attackers love mobile endpointsbecause they can bypass the
perimeter.
There is no firewall when you'resitting in a coffee shop
connected to public Wi-Fi.
Mobile hardening is essentialand it overlaps with endpoint
hardening with greater urgency.
Let's break down the pillars ofmobile hardening.
(09:28):
One, screen locks and biometriccontrols.
Smartphones should never beunlocked by default.
Hardware hardening requirescomplex pin, strong passphrase,
fingerprint, facial recognition,auto lock timer, failed login
wipe threshold.
If a thief steals your phone,your data remains encrypted and
inaccessible.
(09:50):
Full disk encryption.
Modern phones rely heavily onfull disk encryption.
iOS encrypts everything bydefault.
Android uses file-basedencryption or full disk
encryption, depending on themodel.
Encryption protects context,messages, photos, credential
stores, VPN profiles,multi-factor authentication
keys.
A stolen phone without FDE is astolen identity.
(10:14):
MDM Mobile Device Management.
Organizations use MDM platformsto enforce remote wipe, app
control, email configurations,VPN profiles, jailbreak route
detection, storage encryption,location tracking when allowed,
Wi-Fi restriction.
(10:34):
Popular tools include MicrosoftIntune, VMware, Workspace One,
Jamf Pro, and Mobile Iron.
MDM is the foundation ofenterprise mobile security.
When a user roots or jailbreaksa device, sandboxing disappears,
(10:54):
code signing validationdisappears, kernel protection
disappears, attacker achievepersistence instantly, and in
enterprise environments,jailbroken or rooted devices are
prohibited by policy, oftenautomatically quarantined by
MDM.
Mobile malware protection.
Mobile threats include maliciousapps, spyware, SMS phishing or
(11:19):
smishing, app-based ransomware,stalkerware, malicious SDKs
inside legitimate apps.
Therefore, mobile OS vendorsenforce sandboxing, co-signing,
store vetting, permissionprompts, runtime restrictions.
But even with these controls,malware still sneaks in.
(11:42):
Connection methods are one ofthe most important sections in
cybersecurity.
Attackers know that the momentyou walk out the front door,
your device begins connecting tosignals you can't see and don't
control.
Let's break down each connectionmethod and the risk.
1.
Wi-Fi, the most dangerousplayer.
Wi-Fi is the attacker'splayground.
Threats include evil twin APs,rogue access points, packet
(12:06):
sniffing, credential harvesting,downgrading, forcing, fake
captive portals.
Harding includes disabled autojoints, use VPN, forget unknown
networks, require WPA3 whenpossible, and block open
networks.
Cellular networks.
Cellular safer than Wi-Fi butnot invincible.
(12:26):
Threats, IMSI catchers andstingrays, rogue based stations,
SS7 network flaws, hardlink, LTE5G, preferred over 3G, disabled
2G fallback, eSIMS improvements,devices testation features.
Then we have Bluetooth.
People leave Bluetooth on allday, but Bluetooth attacks
(12:48):
include blue jacking, bluesnarfing, blue bugging,
bluetooth impersonation attacks,car hacking vectors, hardening,
turn off Bluetooth when notneeded, reject unknown pairing
attempts, and disable devicevisibility.
Next is near field communicationusing Apple Pay, Google Play,
(13:08):
Keycards, Countless Access,Tap2Pay device.
Risk relay attacks, rare butpossible, unauthorized taps,
fake payment terminals.
Hardling, disable NFC when notactive, and require biometric
confirmation for payments.
Next, GPS, location services,geofencing.
(13:30):
Location privacy is a huge partof cyber.
Attackers and apps can abuse GPStacking, tracking, location
metadata and photos, momentpatterns, movement patterns, and
geofencing triggers.
Hardling, disable location forunnecessary apps.
Use while using apps permissionswhen you when using an app.
(13:52):
Turn off EXIF geo tagging anduse VPN to hide IP based
location.
Mode device often becomegateways for others.
Hotspots expose the device tounauthorized clients, credential
brute forcing, packet sniffing,meter data attack.
(14:14):
USB tethering may expose malwarecrossing between devices,
network policy violations.
Hardening includes stronghotspot passphrase, disable SSID
broadcast, use WPA3 personalwhen available, and rotate
password frequently.
(14:34):
Apps are the soul of mobiledevices and also one of the
greatest dangers.
Let's break down the app-basedattack vectors that you can
possibly encounter.
Number one, app stores safe butnot vulnerable.
Official stores perform codesigning verification, sandboxing
requirements, app review andscanning, but malicious apps
(14:55):
still appear, often disguised asflashlight apps, system
cleaners, QR code scanners, gamemods, and wallpaper apps.
Android also allows APK sideloading that opens the door to
malware installed directly.
Hardenling does block sideloading, enforced manage Google
(15:17):
Play via MDM and uses MAM andMDM for app control.
Next, application permissions,app request, camera access,
Microsoft, microphone access,contacts, location, SMS,
Bluetooth, local network access.
Users tap a lot withoutthinking.
Hardening, enforce leaseprivilege, use OS permission
(15:41):
prompts wisely, revokepermission from unused apps.
Email remains the number oneattack vector.
On mobile devices, users aredistracted, rushed, processing
hundreds of notifications,clicking without verification.
Results phishing, smishing,business email compromise,
credential theft, sessionhijacking.
(16:04):
To harden it, you will want touse secure email gateways,
removed mixed content, disableautomatic image loading, and
force MFA, use container tocontainerized messaging apps.
Modern enterprise use the zerotrust architect.
Never trust, always verify.
(16:25):
Mobile device undergoes deviceposture checks, jailbreak
detection, patch version checks,app inventory checks, network
health check.
If the device failed, it isblocked automatically from
corporate resource.
This saves companies millionseach year in breach cost.
(16:49):
Walk into any office, a printersits in a corner, a camera
watches the lobby, a conferenceroom device waits for the next
video call, a thermostat adjuststhe temperature without a second
thought.
These are endpoints, but unlikelaptops and servers, they are
(17:09):
rarely patched, rarelymonitored, rarely configured
securely, always connected,often forgotten.
And attackers know this.
In 2018, a casino was hackedthrough a smart thermometer in a
fish tank.
Data was stolen because someonenever secured their IoT sensors.
If it connects, it can behacked.
(17:32):
IoT devices have three majorweaknesses.
One, weak or default passwords,two, unpatch firmware, and
three, lack of securitycontrols.
Let's break down the HALMprocess.
One, changing defaultcredentials.
Many IoT devices ship with loginand passwords, such as admin
(17:52):
admin, root root, one two threefour password.
Attackers scan the internet forthese.
Hardling begins with one action.
Change every password.
Firmware updates.
IoT devices often shipvulnerable and stay vulnerable
unless patched manually.
Hardling includes checkingvendor sites, applying signed
(18:13):
updates, removing unsupportedhardware, and setting firmware
update schedules.
Network segmentation, the mostcritical protection, put ILT
devices on their own VLAN.
This isolates cameras, smartTVs, sensors, thermostats,
printers, medical devices.
If the attacker breaches IoT,they cannot move laterally to
(18:35):
workstations or servers.
Disabled unused ports.
IoT devices often rununnecessary services like
Telnet, SSH, UPNP, HTTP admininterfaces, and Bluetooth.
Disabling these removes entrypoints.
Printers aren't harmless.
(18:56):
They store browsing history,print jobs, emails, scan
documents, cache credentials.
They run operating systems, theyhave web interfaces, they
authenticate to servers, theyhave hard drives.
Attackers can exploit printersto default password, unpatched
firmware, exposed admin panels,SNMP attacks, stored print jobs,
(19:18):
network share credentials.
Hardening includes disablingpublic admin panels using HTTPS
only interfaces, requiringauthentication for printers,
regular firmware updates, andclearing job cache.
A printer breach can exposeeverything.
But one thing I want to sayabout a printer is you know that
(19:39):
because of the way the systemworks, your repair guy has their
own username and password forthe printers.
So if you have a guy who comesin to service your printer, he
has his own username andpassword.
(19:59):
And it's it's on the you know,if you if you do a deep dive on
the internet, you'll find it.
So they have a you know, kind oflike a guest mold in there when
the repair guy comes and checksand services your printer.
He has his own user ID andpassword.
So you gotta be careful withthat.
Security cameras should providesafety, but compromised cameras
(20:22):
provide surveillance toattackers.
Threats include IP camerahijacking, RTSP stream
interception, default passwordexposure, hard-coded backdoors,
cloud managed camera breaches,hardling requires VPN only
access, strong credentials,encrypted streams, firmware
(20:42):
supervision, isolated network, ahat camera becomes a spy for the
wrong side.
Industrial control systems andscalar device control, water
treatment plants, electricalgrids, manufacturing robots,
power substations, oilpipelines, heating and cooling
systems.
What are the security issueswith this?
(21:03):
Old firmware, unsupported OSversions, no encryption, no
authentication, remote accessvulnerabilities.
Some run RTOS, real-timeoperating systems, lightweight
but often insecure.
Hardening requires physicalsecurity, network isolation,
micro segmentation, logging andmonitoring, fail-safe
(21:25):
configuration, vendor patchingcycles.
A skater breach doesn't stealdata, it causes physical damage.
USB drives are one of the mostdangerous endpoints ever
created.
Why?
They bypass network security,they deliver malware instantly,
they can emulate keyboards, theycan exploit auto-run
(21:47):
misconfigurations, they areoften trusted blindly.
Attacker types include bad USBwhere the USB firmware is
rewritten to behave like amalicious keyboard, USB drop
attacks, this was very popular.
An attacker leaves an infectedUSB stick in parking lots or
hallways.
Curiosity does the rest.
They used to do this inconventions.
(22:09):
They still do, I think.
Data exfiltration, USB drivesquietly siphon data from
compromised machine, hardening,disabled USB storage, use
endpoint protection rules,require encryption, implement
DLP, data loss prevention, andalert on authorized insertion.
The USB port is a front doormany organizations forget.
(22:32):
Logging turns invisible actionsinto visible evidence.
Endpoints produce logs forauthentication, file access,
connection attempts, systemevents, crashes, unexpected
reboots, application events.
Semi-platforms like Splunk,Sentinel, and QRadar correlate
these logs.
Without logs, you cannotinvestigate, you cannot respond,
(22:53):
you cannot prove what happened,you cannot prevent reoccurrence.
If you didn't log in, it didn'thappen.
Let me tell you a story built onreal events, things removed, but
lesson unchained.
A mid-sized financial firmreceived a complaint.
A few workstations were runningslowly, randomly disconnecting.
(23:15):
The security team checked.
Antivirus clean.
Firewall normal.
Server, no alert.
Everything looked fine, but inone analyst noticed something
strange.
A printer in the lobby wasmaking repeated out-bound
connections to an IP address inEastern Europe.
The printer.
Not a workstation, not a server,not a phone.
(23:35):
A printer.
It had default credentials,outdated firmware, open telet,
open FTP, no segmentations.
Attacker had gained a foothold,use it as a pivot, hijacked
workstation, siphon data,operated silently.
The solution?
Segment the network, update theprinter, implement the allow
(23:56):
listing, deploy EDR, restrictoutbound connections, our
forgotten endpoint nearly causeda catastrophic breach.
Security fails where attentionends.
Alright, here are our fourquestions.
You know how we do it.
(24:18):
Right?
I'll ask you the questions andI'll read it again.
Question number one (24:23):
a security
analysis discovers that a smart
thermostatus current iscommunicating with an unknown
external IP.
The device is on the corporateland.
Which security control will bestprevent this lateral movement?
A application allow listing Bnetwork segmentation, C full
distance encryption orencryption or D single sign-on.
(24:45):
A security analysis discoveredthat a smart thermostat is
communicating with an unknownexternal IP.
The device is on a corporateland.
Which security controls willbest prevent this lateral
movement?
A application allow listing, Bnetwork segmentation, C full
distance encryption or D singlesign-on.
And the answer is I'll give youfive seconds.
(25:08):
5, 4, 3, 2, 1.
It is B network segmentations.
ILT devices like smartthermostat must be isolated
because they often have weaksecurity, run outdated firmware,
connect automatically, and canbe hijacked.
Network segmentation, you couldVLAN it or separate network
(25:29):
zone.
Ensure that if the thermostat iscompromised, it cannot laterally
move through the LAN, cannotreach workstations or servers,
is confined to a limited networksegmentations.
This is the exact scenariosegmentation resolves.
Alright, number two.
When technology providescontinuously monitoring,
(25:49):
behavior analysis, and automatedcontainment on endpoints, I'm
sorry, which technology providescontinuous monitoring, behavior
analysis, and automatedcontainment on endpoints.
A EDR B VPN C NAT or Dhotspotting.
Which technology providescontinuously monitoring,
(26:10):
behavior analysis, and automatedcontainment on endpoint, A EDR,
B VPN, C NAT, or D hotspotting.
It's an easy one to lay up.
And the answer is A EDR.
EDR includes real-timetelemetry, behavior analysis,
threat human, threat huntingtools, automated containment,
(26:31):
machine learning baseddetection.
EDR is the model replacement forbasic antivirus.
Alright, hopefully you are twofor two.
That's what we love it.
We want everybody to go four forfour.
Alright, a user connects to apublic cafe Wi-Fi and shortly
after their credentials arestolen.
Which attack is most likelyhappening?
(26:53):
A evil twin B blue snarfing Crelay attack or B smishing.
A user connects to a public cafeWi-Fi and shortly after their
credentials are stolen.
Which attack is most likely?
A Evil Twin B Blue Snarfing, Crelay attack or D smishing.
I'll give you five seconds.
Five, four, three, two, one.
(27:16):
And the answer is A Evil Twin.
And evil twin attacks when anattacker creates a fake Wi-Fi
access point.
It intimidates a legitimatepublic Wi-Fi name.
Victims connect unknowingly.
Traffic passes through theattacker.
Man in the middle attack.
Credentials and sessions arestolen.
That is an evil twin.
Of course, Blue Snarfing isBluetooth data theft.
(27:39):
Mostly NFC, a proximity base,and smishing is email, uh text
messages, right?
Unsolicited text message.
Alright, last one (27:49):
an Android
device is found when an
unauthorized app installed fromoutside the official store.
What settings should be disabledto prevent this in the future?
A NFC payment B side loadingunknown sources.
C location services or D screenrotations.
An Android device is found whenunauthorized apps installed from
outside the official store.
(28:10):
What settings should be disabledto prevent this future in the
future?
A NFC payments B siloading Clocation services or D screen
rotations.
I think this week the questionshave been pretty simple.
Answer is B siloading.
(28:31):
This bypasses the securityscreening of Google Play and is
a major malware vector.
Disabling this settings ensureapps must originate from trusted
sources.
I remember when I had a Googlethe Android phone.
(28:58):
Alright.
The end is here.
We've hardened servers, we'veprotected mobile devices, we
secure IoT and industry systems.
But the ultimate endpoint is thehuman being.
Humans click links, humans enterpasswords, humans fails, fall
for phishing attacks, humansbring in their own devices,
humans trust untrusted networks,attacker exploit
(29:21):
vulnerabilities, but theyweaponize behavior.
Endpoint security is not aboutmachine, it's about people.
Alright, and thank you forlistening for this lesson today
on endpoint security.
(29:42):
I'm Professor J.
Rod, and as always, keep tappinginto technology.
(30:08):
This has been a presentation ofLittle Cha Cha Productions, art
by Sarah, music by Joe Kim.
We are now part of the Pod MatchNetwork.
You can follow me at TikTok atProfessor J Rod at J R O D, or
you can email me at ProfessorJrod, J R O D at Gmail.com.