Cyber Threat Report: How To Turn Endpoints Into Fortresses