Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Security Audit Shows Gains, Though Privacy Lags

The 2018 Online Trust Audit shows that "encryption everywhere" is improving security, while fuzzy language is slowing privacy gains.

Many organizations talk about website security, but how many live up to the talk? That's the question the Internet Society's Online Trust Alliance (OTA) sought to answer with its annual "Online Trust Audit & Honor Role," which examined more than 1,200 websites to measure their implementation of best practices in three areas: consumer protection (DNS, domain, and brand protection); site, server, application, and infrastructure security; and privacy, transparency, and disclosures.

This marks the 10th year of the comprehensive audit.

"Every year we adjust, looking for the latest best practices that are practical and reasonable for companies of most sizes," says Jeff Wilbur, technical director of the Online Trust Initiative for The Internet Society. The changing perspective on best practices is important, he says, "especially these days with cloud services, where you can get pretty sophisticated things even if you're a small organization."

The good news is that 70% of the websites analyzed this year scored high enough to qualify for the honor roll, up from 54% in the 2017 audit. "Overall, the two big things that jumped out were [best practices around] email authentication and end-to-end encryption of the entire Web session," Wilbur says. About 40% more companies are encrypting their entire Web sessions this year compared with last year, he adds, and that increase accounts for much of the improvement.

According to the report, 93% of sites encrypt all Web sessions. Certain industries made even more dramatic improvements. US government sites were the best-performing of all market segments, with 91% of audited sites making the honor roll. This is up from a fifth place performance in 2017. Consumer sites came in second, with 85% of audited sites making the honor roll. The category came in first place in the 2017 audit, but high breach rates—34% of audited sites reported a breach during the year—prevented a repeat performance.

Federal government sites also scored very well for email protection, with DMARC adoption shown for 93% of sites. This is a critical measure of security, the OTA says, because business email compromise (BEC) remains the leading source of malware infection in organizations of all sorts.

The lowest-performing market segment was also the newest in the audit: Healthcare found only 57% of its audited sites making the honor roll.

Improvements in security were not matched by improvements in privacy, Wilbur says, and that's disappointing. Much of that disconnect can be laid at the doorstep of online advertising. "Sharing your data so that someone can advertise to you — depending on individuals, they may or may not have an issue with that," he says. The problem, he says, language on websites about privacy and how the individual data will be used is "fuzzy enough and vague enough that we think it needs to be clearer and properly set consumer expectations."   

But both the overall status and trends are quite good, Wilbur says, and future audits will help organizations continue to improve.

"We try to choose criteria that are practically implementable by organizations of any size. This can be used as kind of a guidebook for the right thing to do," he says.

Wilbur points out that one of the appendices is a checklist of the criteria an organization could take to a service provider or IT organization with questions about how every point could be answered. The goal, he says, is simple. "Hopefully, if we can get the word out that everyone should be able to do nearly all these things and that they're the right thing to do, we can help improve security and privacy overall, for everybody," Wilbur says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20637
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connecti...
CVE-2020-11650
PUBLISHED: 2020-04-08
An issue was discovered in iXsystems FreeNAS 11.2 and 11.3 before 11.3-U1. It allows a denial of service.
CVE-2020-11653
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
CVE-2020-2732
PUBLISHED: 2020-04-08
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
CVE-2020-1627
PUBLISHED: 2020-04-08
A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending ...