The Top 10 endpoint security challenges and how to overcome them