5.Missing Security Agents. Many companies require agents to be installed on all their endpoints. These agents may monitor network traffic, make sure patches are up to date, or track and report on stolen computers. However, requiring such agents and actually having them installed are two different things. About 1.2 percent of the endpoints that were supposed to have such agent software installed didn't.
Publicize your use policies and monitor your network to make sure the policies are being followed
According to Kolter, the next five issues each showed up in less than 1 percent of the sample.
6.Unauthorized Remote-Control Software. Remote-control software is invaluable for troubleshooting hardware and software. Unauthorized remote-control software is invaluable to the bad guys as well since it offers a royal road into the computer.
In some cases, remote-control software, such as pcAnywhere, is installed by a user who wants to be able to access the desktop from elsewhere. In other cases, the installation is a rogue, with software either installed or modified to allow a third party to use the system without the user's knowledge or consent.
In spite of the obvious danger, the survey found nearly 1 percent (0.82 percent) of the computers surveyed had remote-control software installed that wasn't supposed to be there.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.