Skip to main content
Security

End-User Data Protection: Ten Controls Ranked by Real Impact

Every security vendor has a top-ten list. This one is ordered by what actually stops incidents in the field, from a team that has done the forensic post-mortems.

John Lane 2026-02-10 6 min read
End-User Data Protection: Ten Controls Ranked by Real Impact

Most "top ten" data protection lists read like a compliance checklist — every item is treated as equally important, with vague encouragement to do all of them at once. That's not how security actually works. Some controls stop 90 percent of incidents and others stop maybe two percent, and when you're allocating scarce engineering and budget, it matters which is which.

This list is ordered by real-world impact, based on years of responding to customer incidents and talking to the people who cleaned them up. If you do the first five well, you're ahead of almost everyone. If you do all ten, you're genuinely hard to compromise.

1. Multi-Factor Authentication Everywhere, With FIDO2 for Admins

Nothing on this list comes close to MFA for impact per dollar. The majority of breaches we've investigated in the last five years began with a password that worked from an attacker's computer. MFA breaks that attack chain cold for the vast majority of threats.

But — and this is important — not all MFA is equal. SMS MFA is broken. App-based push MFA has been defeated by fatigue attacks. The gold standard in 2026 is FIDO2 security keys (YubiKey, Titan, or passkeys stored in hardware). For administrators, for developers, and for anyone with access to financial or customer data, FIDO2 should be mandatory. Everyone else should at least be on app-based MFA with number matching.

If your organization has one dollar to spend on security, spend it on FIDO2 keys for your admins.

2. Patch Management That Actually Happens

Most ransomware that lands in customer environments exploits vulnerabilities that were patched months or years before the incident. The patch existed. The patch was not deployed. This is not a technology problem. It is an operational discipline problem.

Automated patch deployment for endpoints, with a weekly cadence for most software and a same-week SLA for critical CVEs. A vulnerability scan at least weekly, with an actual ticketing system attached so findings don't die in a PDF. And — the part nobody likes — a willingness to reboot production on a schedule. The patching programs that work are the ones that get political air cover to actually apply patches, not the ones with the fanciest tooling.

3. Backups That Are Tested, Immutable, and Offline

Backups are the line between a ransomware incident and a ransomware disaster. Every customer who weathered ransomware well had backups that were tested, immutable, and segregated from production authentication. Every customer who paid a ransom did not.

The 3-2-1 rule is still the baseline: three copies of the data, on two different media, with one copy offsite. In 2026, I'd update it to add: and one copy immutable and not reachable from the domain account that owns production. Immutable object storage (S3 Object Lock, Azure Blob immutable) is an excellent fit here. Test the restores quarterly. A backup you haven't restored from is not a backup.

4. Endpoint Detection and Response, Not Just Antivirus

Antivirus signature detection is a 1990s control trying to solve a 2020s problem. EDR (CrowdStrike, SentinelOne, Defender for Endpoint, Huntress) watches for behavior — a legitimate process spawning unexpected children, abnormal network connections, credential dumping from memory. These are the signals that catch modern attacks.

For most organizations in 2026, there is no honest reason to still be running signature-only antivirus. EDR is affordable, it's effective, and paired with a managed SOC (your own or a provider), it catches attacks early enough to do something about them.

5. Least Privilege and Just-in-Time Admin

Over-permissioning is the most common security mistake and the most exploited. Users who should have read-only access have write. Administrators who should only have admin on one system have Domain Admin. Service accounts that should be scoped to one function are in every group imaginable because "it was simpler."

The cleanup is tedious but not hard. Audit who has what. Remove everything not justified by a current business need. Put privileged access behind a just-in-time elevation system (Azure PIM, CyberArk, Teleport, or equivalent). Require approval and time-bound access for elevated operations. Within six months, the blast radius of any single credential compromise drops dramatically.

6. Email Security With Strong Anti-Phishing

Most initial intrusions still start in email. A modern email security layer (Microsoft Defender for Office 365, Proofpoint, Mimecast, Abnormal) plus the email authentication trifecta (SPF, DKIM, and DMARC with enforcement) blocks a huge percentage of phishing before it reaches users.

DMARC in particular is underused. Getting DMARC to reject on your own domain stops a category of brand-impersonation attacks that can directly affect your customers. It takes a few weeks of careful rollout and pays for itself forever.

7. Full-Disk Encryption Everywhere

This one is almost a freebie in 2026. BitLocker on Windows, FileVault on Mac, LUKS on Linux. It's built in, it's effectively free, and it makes a lost or stolen laptop into a non-incident instead of a data breach notification.

The trick is key escrow — the keys need to be recoverable by IT without the user being present — and enforcement through group policy or MDM. If you haven't verified that every endpoint in your fleet is actually encrypted (not just "should be"), do it this week. We've found shockingly high gaps in that number at customer sites.

8. Data Loss Prevention for the Highest-Sensitivity Data

DLP has a reputation for being annoying and noisy, and in its worst form it is. In its best form, it's a targeted control that watches the specific data types that would actually cause a problem — social security numbers, payment card data, patient records, intellectual property — and blocks or alerts on movement to unsanctioned destinations.

The mistake most organizations make is trying to DLP everything at once. Pick your three most sensitive data types. Build policies around those. Tune aggressively. Expand only when the first set is mature. Broad DLP programs collapse under their own false-positive load. Narrow, specific DLP works.

9. Network Segmentation

Flat networks are the best friend of lateral movement. Attackers who land on a single endpoint can ransomware the entire environment because nothing stops them from talking to every other endpoint and server in the network. Segmentation — even simple VLAN-level segmentation with reasonable ACLs — contains the blast radius.

For a modern environment, micro-segmentation through identity-aware access (Zscaler Private Access, Illumio, or the equivalent in Entra) is cleaner than the old VLAN-and-firewall approach. But VLANs with proper ACLs are still much better than nothing, and nothing is what most mid-market networks have.

10. Security Awareness Training That Isn't a Joke

Annual security awareness videos that everyone clicks through while doing other work are theater. The training that actually moves the needle is short, frequent, contextual, and tied to real phishing simulations that are followed up with coaching rather than punishment.

KnowBe4, Hoxhunt, and similar platforms do this well. The goal is not to make users suspicious of every email — it's to make them comfortable reporting anything that feels off, and to make IT responsive when they do. A reporting culture is worth more than a click-through rate on training.

Two Things Not on the List (And Why)

I left password complexity rules and annual security audits off this list deliberately.

Password complexity rules without MFA are close to useless — the attacks that matter bypass them entirely. Password managers and passwordless authentication are the modern answer; complexity rules are a legacy control.

Annual security audits can be valuable, but they are lagging indicators. The controls above are leading indicators. If you do the leading controls well, the audit is a formality. If you don't, the audit is a surprise.

Three Takeaways

  1. FIDO2 MFA for admins and patch discipline are the two highest-impact investments. Everything else comes after.
  2. Immutable, tested backups are the difference between an incident and a disaster. Test your restores.
  3. Fewer, well-executed controls beat a wide checklist. Pick the top five from this list, do them excellently, then extend.

Talk with us about your infrastructure

Schedule a consultation with a solutions architect.

Schedule a Consultation
Talk to an expert →