Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:48 PM
Keith Ferrell
Keith Ferrell

Risky Employee Web Use: Cloud Storms Gathering

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.

How are you going to keep them on task when they can go to the Web? is not only a productivity question, it's a growing security concern. A new study indicates the concern is growing fast.Web-based threats exploded more than 500 percent last year, yet barely 15 percent of small and midsized business feel their employee Web usage policies are effective.

That's one of the findings revealed in new research from security firm Webroot, and not necessarily the most shocking.

In fact, frankly, any of us who are shocked any longer by low Web usage (surfing and running unauthorized Web apps) policy-enforcement numbers are probably too easily shocked.

We all know plenty of businesses that have Web usage policies in place but pay only lip service (if that)to giving them enforceable teeth; most of know plenty more business that have no Web usage policies at all.

Despite this, 30 percent of the 648 companies surveyed have experienced compromised business security as a result of employee Web activity.

The Webroot research found that most businesses are taking precautions against e-mail borne threats (good, keep it up, but e-mail in may ways is yesterday's threat vector: ongoing, but not where the malicious action is centered today.)

And the more features the Web offers, the more temptations employees have to use it. As Webroot's COO Mike Irwin noted in a statement, 2007 was the year "cybercriminals developed new ways to attack on-site and remote employees through personal Web mail accounts, social networking sites and other Web 2.0 applications."

Three questions for you:

When's the last time you reviewed your Web usage policy (assuming your business has one) with your employees?

When's the last time you updated the policy to deal with Web 2.0 and other innovations (and threats) coming from the Cloud?

When's the last time you made clear that the policy is going to be enforced?

Take a look at your answers and adjust accordingly.

Besides which, according to the research, a third of the surveyed companies have employees spending at least an hour a day on non-business Web usage.

Here's an idea: why not just give those employees an extra day or so off each week provided they no longer use the Web for personal use at work or on company equipment.

You wouldn't be losing any productivity and you'd be shifting the risk to their machines.

(Webroot acknowledged the importance and potential of Web 2.0 for small and midsized business -- emphasis on business -- and here's a detailed bMighty look at how to put Web 2,0 to work for your company.)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.