Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:48 PM
Keith Ferrell
Keith Ferrell

Risky Employee Web Use: Cloud Storms Gathering

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.Web-based threats exploded more than 500 percent last year, yet barely 15 percent of small and midsized business feel their employee Web usage policies are effective.

That's one of the findings revealed in new research from security firm Webroot, and not necessarily the most shocking.

In fact, frankly, any of us who are shocked any longer by low Web usage (surfing and running unauthorized Web apps) policy-enforcement numbers are probably too easily shocked.

We all know plenty of businesses that have Web usage policies in place but pay only lip service (if that)to giving them enforceable teeth; most of know plenty more business that have no Web usage policies at all.

Despite this, 30 percent of the 648 companies surveyed have experienced compromised business security as a result of employee Web activity.

The Webroot research found that most businesses are taking precautions against e-mail borne threats (good, keep it up, but e-mail in may ways is yesterday's threat vector: ongoing, but not where the malicious action is centered today.)

And the more features the Web offers, the more temptations employees have to use it. As Webroot's COO Mike Irwin noted in a statement, 2007 was the year "cybercriminals developed new ways to attack on-site and remote employees through personal Web mail accounts, social networking sites and other Web 2.0 applications."

Three questions for you:

When's the last time you reviewed your Web usage policy (assuming your business has one) with your employees?

When's the last time you updated the policy to deal with Web 2.0 and other innovations (and threats) coming from the Cloud?

When's the last time you made clear that the policy is going to be enforced?

Take a look at your answers and adjust accordingly.

Besides which, according to the research, a third of the surveyed companies have employees spending at least an hour a day on non-business Web usage.

Here's an idea: why not just give those employees an extra day or so off each week provided they no longer use the Web for personal use at work or on company equipment.

You wouldn't be losing any productivity and you'd be shifting the risk to their machines.

(Webroot acknowledged the importance and potential of Web 2.0 for small and midsized business -- emphasis on business -- and here's a detailed bMighty look at how to put Web 2,0 to work for your company.)

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
PUBLISHED: 2019-12-08
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareNa...
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.