Examine endpoint security, its purpose, and the associated risks. Tips for hardening individual endpoints are also provided.