Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:48 PM
Keith Ferrell
Keith Ferrell

Risky Employee Web Use: Cloud Storms Gathering

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.Web-based threats exploded more than 500 percent last year, yet barely 15 percent of small and midsized business feel their employee Web usage policies are effective.

That's one of the findings revealed in new research from security firm Webroot, and not necessarily the most shocking.

In fact, frankly, any of us who are shocked any longer by low Web usage (surfing and running unauthorized Web apps) policy-enforcement numbers are probably too easily shocked.

We all know plenty of businesses that have Web usage policies in place but pay only lip service (if that)to giving them enforceable teeth; most of know plenty more business that have no Web usage policies at all.

Despite this, 30 percent of the 648 companies surveyed have experienced compromised business security as a result of employee Web activity.

The Webroot research found that most businesses are taking precautions against e-mail borne threats (good, keep it up, but e-mail in may ways is yesterday's threat vector: ongoing, but not where the malicious action is centered today.)

And the more features the Web offers, the more temptations employees have to use it. As Webroot's COO Mike Irwin noted in a statement, 2007 was the year "cybercriminals developed new ways to attack on-site and remote employees through personal Web mail accounts, social networking sites and other Web 2.0 applications."

Three questions for you:

When's the last time you reviewed your Web usage policy (assuming your business has one) with your employees?

When's the last time you updated the policy to deal with Web 2.0 and other innovations (and threats) coming from the Cloud?

When's the last time you made clear that the policy is going to be enforced?

Take a look at your answers and adjust accordingly.

Besides which, according to the research, a third of the surveyed companies have employees spending at least an hour a day on non-business Web usage.

Here's an idea: why not just give those employees an extra day or so off each week provided they no longer use the Web for personal use at work or on company equipment.

You wouldn't be losing any productivity and you'd be shifting the risk to their machines.

(Webroot acknowledged the importance and potential of Web 2.0 for small and midsized business -- emphasis on business -- and here's a detailed bMighty look at how to put Web 2,0 to work for your company.)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...