Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/23/2008
12:48 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Risky Employee Web Use: Cloud Storms Gathering

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.Web-based threats exploded more than 500 percent last year, yet barely 15 percent of small and midsized business feel their employee Web usage policies are effective.

That's one of the findings revealed in new research from security firm Webroot, and not necessarily the most shocking.

In fact, frankly, any of us who are shocked any longer by low Web usage (surfing and running unauthorized Web apps) policy-enforcement numbers are probably too easily shocked.

We all know plenty of businesses that have Web usage policies in place but pay only lip service (if that)to giving them enforceable teeth; most of know plenty more business that have no Web usage policies at all.

Despite this, 30 percent of the 648 companies surveyed have experienced compromised business security as a result of employee Web activity.

The Webroot research found that most businesses are taking precautions against e-mail borne threats (good, keep it up, but e-mail in may ways is yesterday's threat vector: ongoing, but not where the malicious action is centered today.)

And the more features the Web offers, the more temptations employees have to use it. As Webroot's COO Mike Irwin noted in a statement, 2007 was the year "cybercriminals developed new ways to attack on-site and remote employees through personal Web mail accounts, social networking sites and other Web 2.0 applications."

Three questions for you:

When's the last time you reviewed your Web usage policy (assuming your business has one) with your employees?

When's the last time you updated the policy to deal with Web 2.0 and other innovations (and threats) coming from the Cloud?

When's the last time you made clear that the policy is going to be enforced?

Take a look at your answers and adjust accordingly.

Besides which, according to the research, a third of the surveyed companies have employees spending at least an hour a day on non-business Web usage.

Here's an idea: why not just give those employees an extra day or so off each week provided they no longer use the Web for personal use at work or on company equipment.

You wouldn't be losing any productivity and you'd be shifting the risk to their machines.

(Webroot acknowledged the importance and potential of Web 2.0 for small and midsized business -- emphasis on business -- and here's a detailed bMighty look at how to put Web 2,0 to work for your company.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5421
PUBLISHED: 2020-09-19
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...