End-user computing (EUC)

End-user computing (EUC) is a term that refers to systems in which non-programmers can create working applications.

Back to glossary

End-user computing (EUC) is a term that refers to systems in which non-programmers can create working applications. EUC is a group of approaches to computing that aim to better integrate end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform problem-solving in a trustworthy manner.

In the context of cybersecurity, EUC is a critical area to understand and manage, as it can often be a weak link in an organization's security posture. The reason for this is that end users - the employees, contractors, and other individuals who use a company's IT systems - often have little understanding of cybersecurity best practices, and may inadvertently expose the organization to risks.

Understanding end-user computing

End-user computing (EUC) is a term that refers to the technologies and practices that end users employ to get their jobs done. This can include everything from laptops and smartphones to software applications and cloud services. The key point is that these are the tools that end users interact with directly, rather than backend systems or infrastructure that IT departments typically manage.

From a cybersecurity perspective, EUC is important because it represents the "front lines" of an organization's IT environment. This is where most cyber attacks occur, as attackers often target end users with tactics like phishing emails, malicious websites, and malware-infected downloads.

Types of EUC

There are many different types of EUC, reflecting the wide range of technologies and tools that end users might use. Some of the most common include:

  • Desktop and laptop computers: These are the primary tools that most end users use to do their jobs. They can run a wide range of software applications, and can connect to the internet and other networks.
  • Mobile devices: Smartphones and tablets are increasingly being used for work purposes, especially with the rise of remote work and bring your own device (BYOD) policies.
  • Software applications: End users rely on a wide range of software applications, from productivity suites like Microsoft Office, to specialized tools for tasks like graphic design or project management.
  • Cloud services: Many organizations now use cloud-based services for tasks like email, file storage, and collaboration. These services can be accessed from any device with an internet connection, making them a key part of many end users' workflows.

Each of these types of EUC presents its own unique cybersecurity challenges, which we'll explore in more detail later in this article.

EUC and cybersecurity

As mentioned earlier, EUC is a critical area for cybersecurity. This is because end users are often the weakest link in an organization's security posture. They may not be aware of best practices for cybersecurity, and may inadvertently expose the organization to risks through actions like clicking on phishing emails, using weak passwords, or connecting to insecure Wi-Fi networks.

Because of this, it's important for organizations to have robust cybersecurity policies and training programs in place for end users. These should cover topics like how to recognize and avoid phishing attempts, the importance of using strong, unique passwords, and the risks of using public Wi-Fi networks for work-related tasks.

Common EUC cybersecurity risks

There are many cybersecurity risks associated with EUC. Some of the most common include:

  • Phishing: This is a type of cyber attack in which attackers send deceptive emails that appear to be from legitimate sources. The goal is to trick the recipient into clicking on a malicious link or attachment, or divulging sensitive information like passwords or credit card numbers.
  • Malware: This is a broad category of malicious software that can include viruses, worms, ransomware, and more. Malware can be spread through a variety of means, including email attachments, malicious websites, and infected software downloads.
  • Weak passwords: Many end users use weak or easily guessable passwords, or reuse the same password across multiple accounts. This makes it easier for attackers to gain access to their accounts.
  • Unsecured Wi-Fi: Using public Wi-Fi networks for work-related tasks can expose sensitive data to interception by attackers.

These are just a few examples of the many cybersecurity risks associated with EUC. Organizations need to be aware of these risks and take steps to mitigate them.

Managing EUC cybersecurity risks

There are several strategies that organizations can use to manage the cybersecurity risks associated with EUC. These include:

  • Training: Providing regular cybersecurity training to end users can help them understand the risks and learn how to avoid common threats. This should be a key part of any organization's cybersecurity strategy.
  • Policies: Organizations should have clear policies in place for how end users should use and maintain their devices and software. This can include things like requiring regular software updates, prohibiting the use of personal devices for work purposes, and enforcing strong password policies.
  • Monitoring: Regular monitoring of end user devices and activities can help organizations detect and respond to potential threats. This can include things like network monitoring, log analysis, and intrusion detection systems.
  • Incident response: In the event that a security incident does occur, organizations should have a plan in place for how to respond. This can include steps for isolating affected systems, investigating the incident, and communicating with stakeholders.

By implementing these strategies, organizations can significantly reduce the cybersecurity risks associated with EUC.

Conclusion

End-user computing (EUC) is a critical area for cybersecurity. Because end users often lack knowledge of cybersecurity best practices, they can inadvertently expose organizations to risks. However, by understanding the unique challenges associated with EUC and implementing effective strategies for managing these risks, organizations can significantly improve their overall security posture.

This article has provided a comprehensive overview of EUC and its relevance to cybersecurity. We've explored the different types of EUC, the common cybersecurity risks associated with them, and the strategies that organizations can use to manage these risks. With this knowledge, you'll be well-equipped to understand and address the cybersecurity challenges associated with end-user computing.

Author Sofie Meyer

About the author

Sofie Meyer is a copywriter and phishing aficionado here at Moxso. She has a master´s degree in Danish and a great interest in cybercrime, which resulted in a master thesis project on phishing.

Similar definitions

Kerning Joule Swatting Credentials Request for proposal (RFP) Chrome extension Exception Key fob Resource reservation protocol (RSVP) Personal digital assistant (PDA) Uniform resource locator (URL) Network block device (NBD) Confidentiality One-time password (OTP) Direct message (DM)