Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Security Audit Shows Gains, Though Privacy Lags

The 2018 Online Trust Audit shows that "encryption everywhere" is improving security, while fuzzy language is slowing privacy gains.

Many organizations talk about website security, but how many live up to the talk? That's the question the Internet Society's Online Trust Alliance (OTA) sought to answer with its annual "Online Trust Audit & Honor Role," which examined more than 1,200 websites to measure their implementation of best practices in three areas: consumer protection (DNS, domain, and brand protection); site, server, application, and infrastructure security; and privacy, transparency, and disclosures.

This marks the 10th year of the comprehensive audit.

"Every year we adjust, looking for the latest best practices that are practical and reasonable for companies of most sizes," says Jeff Wilbur, technical director of the Online Trust Initiative for The Internet Society. The changing perspective on best practices is important, he says, "especially these days with cloud services, where you can get pretty sophisticated things even if you're a small organization."

The good news is that 70% of the websites analyzed this year scored high enough to qualify for the honor roll, up from 54% in the 2017 audit. "Overall, the two big things that jumped out were [best practices around] email authentication and end-to-end encryption of the entire Web session," Wilbur says. About 40% more companies are encrypting their entire Web sessions this year compared with last year, he adds, and that increase accounts for much of the improvement.

According to the report, 93% of sites encrypt all Web sessions. Certain industries made even more dramatic improvements. US government sites were the best-performing of all market segments, with 91% of audited sites making the honor roll. This is up from a fifth place performance in 2017. Consumer sites came in second, with 85% of audited sites making the honor roll. The category came in first place in the 2017 audit, but high breach rates—34% of audited sites reported a breach during the year—prevented a repeat performance.

Federal government sites also scored very well for email protection, with DMARC adoption shown for 93% of sites. This is a critical measure of security, the OTA says, because business email compromise (BEC) remains the leading source of malware infection in organizations of all sorts.

The lowest-performing market segment was also the newest in the audit: Healthcare found only 57% of its audited sites making the honor roll.

Improvements in security were not matched by improvements in privacy, Wilbur says, and that's disappointing. Much of that disconnect can be laid at the doorstep of online advertising. "Sharing your data so that someone can advertise to you — depending on individuals, they may or may not have an issue with that," he says. The problem, he says, language on websites about privacy and how the individual data will be used is "fuzzy enough and vague enough that we think it needs to be clearer and properly set consumer expectations."   

But both the overall status and trends are quite good, Wilbur says, and future audits will help organizations continue to improve.

"We try to choose criteria that are practically implementable by organizations of any size. This can be used as kind of a guidebook for the right thing to do," he says.

Wilbur points out that one of the appendices is a checklist of the criteria an organization could take to a service provider or IT organization with questions about how every point could be answered. The goal, he says, is simple. "Hopefully, if we can get the word out that everyone should be able to do nearly all these things and that they're the right thing to do, we can help improve security and privacy overall, for everybody," Wilbur says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12420
PUBLISHED: 2019-12-12
In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
CVE-2019-16774
PUBLISHED: 2019-12-12
In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver.
CVE-2018-11805
PUBLISHED: 2019-12-12
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf ...
CVE-2019-5061
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table att...
CVE-2019-5062
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of...