With cyber threats on the rise, how does a small business manage computer security? Endpoint management tools and services can help you control all your devices.
Endpoint management tools require an experienced IT professional to configure and manage them day to day, so for most small businesses without IT staff, this can be a challenge.
The solution most small businesses use is hiring a Managed Services Provider to take care of their business computer security management for them, including unified endpoint management services.
Before we babble on, let’s start at the beginning.
What is an Endpoint?
An endpoint is any device that connects to your company data or network. Examples of endpoint devices include:
- Laptops
- Tablets
- Mobile devices
- Point-of-sale (POS) systems
- Switches
- Servers
- Printers & scanners
What is Endpoint Management?
Endpoint management is a function of IT and a cybersecurity process that consists of evaluating, assigning and overseeing the access rights of all endpoints, and applying security controls that will reduce the risk of an attack or greatly reduce damage in such events.
Endpoint management is also also known as unified endpoint management, computer management, device management and endpoint security, though depending on the title used, varying components would be included or excluded.
Do all endpoints need to be managed?
Yes, all devices connecting to your company email or data need to be screened, authenticated and monitored through a unified endpoint management tool. Unmanaged devices pose great risk to your cybersecurity.
What about computers owned by staff?
Personal computers at work throw a big wrench into cybersecurity defenses for small business. They may be a far greater security risk compared to computers owned and managed by your organization. This is because of:
- insecure or insufficient tooling of the device
- inconsistent enforcement of security controls (often completely ignored by the user)
- potentially connecting to high risk networks at home and public WiFi networks
As you will see, the security controls needed to protect your business would impede a users use of their personal device. Chances are high they would circumvent security controls. IT security research backs this behavioural finding.
Now, there are workarounds we will share to allow personal computers to securely connect, but the best practice is to own and manage all devices touching company data.
What is included in Endpoint / Device Management?
Endpoint Management includes several key processes and procedures. Often, people learning about cyber security confuse patch management and endpoint management, when in fact patch management is a component of endpoint management.
Here at TUCU, we offer basic device management and comprehensive, Unified Endpoint Management Services to meet the varying needs of our clients. We look at each device as a breach point, and take all actions necessary to limit the risk of breach or minimize the damage upon breach. This is the foundation of Zero Trust Security and current IT practices.
Endpoint management solutions vary in scope, whether done in house in a corporate environment, manually by a small business, or automated by a Managed Services Provider. Below are some of the most common components.
1. Patch Management
Lack of patch management is one of the most common culprits in SMB breaches.
The software you use to run your business is pulled apart by cyber criminals, looking for vulnerabilities in the code that can be used to hack into your accounts and gain a foothold.
Software developers write new code to “patch” the vulnerability and push the fix out to all users. Most users ignore software update notifications for days, weeks or months. Every single security audit we have performed on a small business has had multiple unpatched, and therefore highly vulnerable computers in the bunch.
As your Managed Services Provider, we automate patch management for you. Patches are applied daily and weekly depending on priority and risk level. Then, all patches are double checked every Wednesday.
This significantly reduces your vulnerability and risk of breach.
2. Managed Antivirus & Updates
Cyber criminals work on coding new malware, adware, spyware, ransomware and threats everyday, and then sell those exploit kits on the black market to other cyber criminals. They make money both from the application and sale of their code kits.
To combat these threats, antivirus companies have to also work everyday to write new software code identify and block those threats. They earn money to pay their team of computer scientists by charging for their antivirus products.
Free antivirus software is not updated regularly enough and is considered by IT professionals to be fairly useless. This is why you must invest in actively updated antivirus for small business, such as BitDefender. However, AV software alone is not enough.
Some vulnerabilities are not immediately detected and coded for, and can get through antivirus filters, causing damage to your business. This is why a layered approach to computer security is necessary.
Endpoint management and all its components are just one layer of a cyber security posture. Other layers might include Identity Access Management, password policy enforcement and other policies applied from within Active Directory or Azure AD, a firewall and IDS/APS systems, and more.
3. Endpoint Detection & Remediation (EDR)
Endpoint Detection & Remediation (EDR) or endpoint detect and repair, is a highly sophisticated cyber security toolset which gives you visibility into activity on your devices so that threat detection can occur at a deeper level.
Antivirus is a prevention tool in endpoint security. It aims to stop known threats at the border, so to speak. Some threats slip past the AV software and this is where EDR comes in, seeing the abnormal activity on an endpoint, and quarantining it for a security check by your IT team before it is allowed to move laterally to another computer via email or network connections.
4. Administrative Restriction & Control
Administrative restriction is an important part of reducing cyber risk.
All new computers ship with full administrative privileges which allow you to install new software on to your new computer. That same administrative power also allows users to accidentally install a virus or ransomware, or to download innocent looking software apps for various parts of their job that contain keyloggers or malicious code.
A simple click on a bad link or opening of an infected attachment is enough to launch the malware program to run.
These drive by and accidental installations are all but eliminated with the right settings.
It’s best practice to create and use a standard user profile for day to day computing needs. An administrative profile should only be used by a trained technician to make approved changes in line with your company security policies.
5. Application Controls
Application Control and Ringfencing offers additional protection for your devices from spoofed apps and malicious browser extensions.
Application controls are installed on each device and work by checking multiple authentication points including digital certificates and developers to ensure authenticity before allowing you or a team member to install an app. This helps allow authentic apps and block spoofed apps that contain malware, as well as high risk browser extensions from being installed. Since the internet is full of fake apps and malware, app controls are a smart addition to your computer security toolkit.
Endpoint Compliance Requirements
Endpoint Management has become a common requirement for many industries and business service agreements. This means that your company may be asked to complete an information security screening in order to win a client or become an authorized vendor in your industry.
Whether you use Google Workspace, or are looking to meet vendor security requirements using Microsoft 365, a good MSP like TUCU can help.
Be ready to do business with secure systems, including an endpoint management solution that matches your business needs, by getting professional help today.
Get Expert Help
Now that you have an understanding of endpoint security and management, you might see the value in working with a technology provider who will automate, monitor and manage these systems for you.
TUCU Managed IT Services Inc has been serving small business teams since 2003. We specialize in cybersecurity and IT compliance solutions.
Talk to us about your total IT & computer security needs today.


