Compromised endpoint devices such as laptops, tablets, mobile phones and printers have become primary access points for cybercriminals attempting to infiltrate networks. More than two-thirds of IT security professionals say their organizations have experienced one or more endpoint attacks that successfully compromised their data and infrastructure, according to research from the Ponemon Institute.