Lumu, creators of the Continuous Compromise Assessment cybersecurity model, today announced the launch of the Lumu Agent for Windows, a lightweight software built for remote workers in mind, that measures user device’s compromise levels in real time. Once installed on an end user’s machine, the Lumu Agent silently and persistently runs in the background, collecting network metadata which is then correlated and analyzed by Lumu to provide the most complete compromise visibility available today.
According to a March 2020 survey conducted by Gartner, 88% of organizations worldwide have either mandated or encouraged their employees to work from home due to the global pandemic with many organizations having since announced they will continue to allow employees to work remotely even after the pandemic has ended.
Since millions of employees began logging in from home, opportunistic cyber criminals have been aggressively targeting remote employees with ransomware and spearphishing campaigns, which when successful can provide them with unfettered access to the corporate network. With cloud technology and adoption skyrocketing over the years, fear of a cloud data security breach has increased significantly just in the past two years, with 53% of IT professionals citing it as a top security concern in 2020
Read More : SalesTechStar Interview with Scott Lasica, Chief Sales Officer at Stream
“WFH has become incredibly popular, and many organizations have realized the efficiencies of this method of work, rethinking offices altogether. Unfortunately, enterprises are not the only ones taking advantage of this modality — cybercriminals have found a path to least resistance with remote workers and cyberthreats are an all-time-high,” said Ricardo Villadiego, founder and CEO of Lumu.
“This innovation comes amid the loss of attack visibility resulting from employees working from outside the perimeter and the need to swiftly identify compromises and minimize lateral movement to high value assets. The Lumu Agent will make it easy for security teams to get a unified view of all of the endpoint devices connected to their network and understand whether any of these devices have been compromised.”
Read More : Three Ways to Measure Whether Sales and Marketing Teams are in Sync