It is a computing device used by individuals for various different purposes. It communicates with the network  to access the internet, emails, applications and performing other tasks. Examples of endpoints include:

  • Desktops, Laptops & Workstations.
  • Smartphones & Tablets.
  • Servers
  • Printers, ATM machines & Medical device
  • Internet-of-things (IoT) devices

Endpoints are key vulnerable points which adversaries target to exploit and attack. Endpoints also store user data which attackers wish to encrypt to demand ransom or steal to sell on the darkweb. Endpoints today are increasingly susceptible to cyberattacks especially because organizational workforces are becoming more mobile and users connecting to internal resources from off-premises all over the world. 

Apart from using endpoints to access high-value information and exfiltrate data from an organization’s network, adversaries also take control of these endpoints and use it in a botnet to execute a DoS attack.