IT managers can’t ignore endpoints because most cyberattacks start there