The endpoint security problem persists - MEAD offers a new approach

An abstract image of digital security.
(Image credit: Shutterstock) (Image credit: Shutterstock)

We spend a lot of time talking about gaps in cybersecurity, but weak points are often the bigger problem. Case in point: a recent TAG report found that 93% of cybersecurity teams have endpoint data controls in place, yet only 7% were confident that these controls were working — and 71% of CISOs said they wouldn’t be surprised if they had a serious data breach on their business PCs and laptops.

In other words, nearly all organizations have tools to cover their endpoint data security gaps. They just don’t work — and everyone knows it.

TAG report uncovers familiar issues with endpoint security

Despite plenty of attention over the last decade, endpoints remain a common source of data loss and data breach. So, the TAG study looked at how companies protect endpoint data today — and found some deficits that likely sound familiar to any CISO.

Beyond companies’ startling lack of confidence in their endpoint protection and recovery capabilities, TAG identified an overreliance on employee actions as the control to comply with cybersecurity policy (don’t get me wrong, people are great; but we make mistakes); additionally, TAG warned of increasing misuse of cloud collaboration platforms like OneDrive in place of purpose-built, automated endpoint backup and recovery.

Todd Thorsen

Chief Information Security Officer, CrashPlan.

Advancing cybersecurity maturity overshadows endpoint security problems

Perhaps most importantly, TAG noted that using more cybersecurity tools did not translate to less endpoint risk; it’s really about using the right tools for the right application. Moreover, as organizations have advanced their overall cybersecurity maturity — adding sophisticated cloud security tools, for example — this progress has produced a halo of overconfidence among CISOs that overshadows endpoint data security and resilience problems: “Many enterprise teams possess a false sense of security for endpoint data resilience and restoration post-incident,” TAG concluded.

MEAD: A simplified model of endpoint security

The TAG report wasn’t all bad news. The leading cybersecurity advisory firm proposed a new model that radically simplifies the approach to building a modern endpoint security program. The back-to-basics framework is called MEAD, comprising four pillars: Malware (e.g. Malwarebytes), EDR (e.g. CrowdStrike), Analytics (e.g. Tanium), and Data.

The MEAD model holds that CISOs should focus first on ensuring confidence in these four fundamental areas — in other words, focus on the fundamentals before spending time evaluating novel and niche technology promising to cover emerging gaps or edge cases.

Endpoint backup is the foundation of MEAD

Importantly, TAG puts endpoint backup as the foundational layer of endpoint security — enveloping all else with the confident assurance of data resilience. This shouldn’t be a surprise — backing up endpoint data has always been the most reliable way to ensure data availability, no matter what happens. But TAG highlights the need for “a purpose-built endpoint data protection and resilience platform,” as a distinct correction from the widespread trend of misusing cloud collaboration tools as an (inadequate) substitute for true endpoint data backup.

We need MEAD

Managing complexity is a common challenge in cybersecurity today. The enterprise ecosystem keeps getting bigger and more complicated. Threats and threat actors keep getting more sophisticated. It’s no surprise that the dominant response has been to add more to the security stack.

The biggest takeaway from the TAG report flies in the face of this complexity: The biggest risks are still some of the most fundamental (protecting endpoint data). And this isn’t a problem that requires elaborate technology or adding more layers to the security stack. We know how to fix endpoint security — it’s about getting back to basics, starting with putting a secure, purpose-built, and automated endpoint data backup and recovery platform in place.

We've listed the best cloud antivirus.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Todd Thorsen, Chief Information Security Officer, CrashPlan.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Abstract image of cyber security in action.
Four key questions to strengthen your cyber threat detection strategy
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Latest in Pro
Branch office chairs next to a TechRadar-branded badge that reads Big Savings.
This office chair deal wins the Amazon Spring Sale for me and it's so good I don't expect it to last
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
FlexiSpot office furniture next to a TechRadar-branded badge that reads Big Savings.
Upgrade your home office for under $500 in the Amazon Spring Sale: My top picks and biggest savings
Beelink EQi 12 mini PC
I’ve never seen a PC with an Intel Core i3 CPU, 24GB RAM, 500GB SSD and two Gb LAN ports sell for so cheap
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Latest in News
Open AI
OpenAI live stream - could we see a major ChatGPT upgrade?
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
Monster Hunter Wilds
Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection