Adapt Your Endpoint Security Strategy