Security in 2012: Let's start at the endpoint