Home > Web Browsers > 10 Myths of Safe Web Browsing
10 Myths of Safe Web Browsing
Posted on Thursday, August 18, 2011 by Arman Zulhajar

So why so much IT complacency? Experts point to 10 big myths about safe browsing inside the enterprise:
Myth 1: The enemy is kids. Hah, snorted Santorelli who explained the enemy comes in all ages and most of them are in it to make money. A proof was the late September round-up of around 100 hackers in the U.S., U.K. and the Ukraine. The ring bilked businesses of up to $100 million using the Zeus Trojan (a slick key logger). Thrill seeking hackers are out there. The 17-year-old Aussie who hacked into Twitter and sent users to Japanese porno sites is an example, but the real danger said Santorelli is the mounting number of for-proft criminals who are intent on looting corporate treasuries.
Myth 2: Updated anti-virus software will keep enterprise computers safe. Rubbish, said Dave Lowenstein, CEO of IT security frm Federated Networks. “It neutralizes at best 25 to 50 percent of threats,” he said. Meaning it misses 50 percent or more.
Myth 3: Apple computers are safe. Some CIOs say requests to bring in Apple gear is rising. The purported safety angle often is cited, but it is nonsense, said John Linkous, chief security offcer for security frm eiQnetworks. Lack of Macs in business is why they have been ignored. If Apple sells more computers into enterprise, hacker interest will necessarily rise because they follow the money.
Myth 4: Some websites are trustworthy. Security experts pinpoint this as perhaps the prime problem of the moment. Threats increasingly have shifted out of email and onto “trusted” websites. Facebook frequently is cited. Because users’ guards are down their vulnerability rises and if they are using the corporate network, hold on, troubles are brewing.
Myth 5: Gaming consoles are safe. Christopher Boyd, a senior threat researcher for GFI Software, pegged this as a surprise vulnerability at many companies that set up gaming devices in the employee lunchroom and then fail to recognize that it’s a backdoor into the system. Problems are acute with Xbox 360s, but he said other devices also pose risks.
Myth 6: Unmanaged smartphones represent minor risks. Don’t believe it, said Mark Guntrip, a product manager at Cisco, who indicated that smartphones ought to be ever more worrisome to CIOs. As the phones get smarter, with more memory and more processing power, users are indeed browsing with them and that can be a route into
the corporate network.
Myth 7: Outside hackers are your prime threat. Not so fast, said LogLogic executive VP Bill Roth who pointed to data that claims 48 percent of all security incidents involve insiders.
Myth 8: Strong passwords are a cure. “Security types will go on about ‘strong’ passwords, but a strong password is just as phishable or keyloggable as a weak one, and if the one strong password applies to many of your accounts, you might fnd that more than just your Facebook account has been hijacked,” said Tom Newton, an executive with security company SmoothWall.
Myth 9: Tablets are inconsequential security risks. Apple alone has sold some 3.3 million iPads and BlackBerry, Samsung and more are piling on this form factor. Some CIOs continue to think that tablets running mobile phone operating systems are no big deal regarding security.
Think again, said Tyler Reguly, lead security engineer for nCircle, a network security and compliance auditing frm. “Tablets are really changing the game and content will just get harder for enterprises to manage. I’ve been caught by this myself recently. I hadn’t considered the risks of browsing a website using a custom app and was hit by ‘click-jacking’ on a popular social networking site. Unfortunately, tablet apps add another attack surface that is very diffcult to lock down.”
Myth 10: “The biggest myth of safe web browsing is the myth of training,” said Anup Ghosh, founder of Invincea, a start-up security company. He claimed that threats have gotten so sophisticated and so camoufaged that they now often fool even sophisticated computer users. That means it just may be impossible to train employees to be safe, said Ghosh. Are you listening now? This just may be a golden age for cyber criminals, say the experts. For CIOs this means it is time to really do a security inventory ASAP.
Category Article 10 Myths of Safe Web Browsing, Safe Web Browsing, Web Browsers
Random Posts
-
Rainbow Web 3 [FINAL] GAME » Match3 The dark Sorcerer Spider has risen to power again, and you are the only one who can stop this villain! ...
-
Halo: Combat Evolved Anniversary is an amazing remastered version of the original "Halo" campaign, created in celebration of the ...
-
CreaVures ( PLATFORM ) [FINAL] Restore the light and help five different CreaVures work together as they save the dying forest in this fun A...
-
Fashion Forward(DASH) [FINAL]| 98 MB finds all is not smiles and sunshine in Fashion Forward, a fun time management adventure from Sandlot G...
-
askutiniu metu vis pataikau žiūrėti liūdnus filmus. Vakarykštį vakarą praleidome keturiese prie "The road" . Vis dar kelia smalsum...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
August
(237)
- Google Alert - FrontierVille Cheats Videos
- Deus Ex Human Revolution System Requirements
- Google Alert - Farmville Cheats
- Play Angry Birds on PC - Download Now!
- Things People Do Not Tell You
- My collection of vases is growing
- Find Your Personal Computer's Gender
- Download Update Angry Birds for PC Version 1.6.2
- Angrey Birds Game and Walkthrough
- Types of Computer Games
- What is a Migraine Headache? Causes, Symptoms and ...
- Angry Birds Golden Egg Locations
- Google Alert - FrontierVille Cheats Videos
- Google Alert - CityVille Cheats
- The Secrets Of Arcelia Island [FINAL FIXED]
- The Secret Order [BETA]
- Crime Solitaire [FINAL]
- Rainbow Web 3 [FINAL]
- A couple of sparrows
- For the Health Benefits of Tomatoes
- Benefits of Bananas and It works for the Health
- Google Alert - FrontierVille Cheats
- Madden 12 Release Date
- Coffee for Health Benefits
- Google Alert - Facebook Games News
- Make Your Firefox Look More Like Chrome
- Handling Security of the WAP Site Log-in Form
- An oyster-catcher
- 6 Good Fat Foods
- Xbox 360 Live Subscription Gold Card - Best Price!
- Google Alert - Facebook Games News
- A new painting
- Hair Length Checks and Your Sanity
- Too Salty Milk Cow for Baby
- You Being Able To Drink Coffee Or Cappuccino Whene...
- Krups KP 2100/YY 1448FD Dolce Gusto Black
- Battlefield 3 Release Date - Order Now!
- Age Of Enigma: The Secret Of The Sixth Ghost [FINAL]
- Sonya Collector's Edition [FINAL]
- Haunted Halls 2: Fears from Childhood [BETA]
- Fairway Solitaire 2 [BETA]
- Spirit Soup: The Queensbury Curse [FINAL]
- Bomb Squad New York: Duke And I [BETA]
- Dream Chronicles: The Book Of Water Sammleredition...
- Unsolved Mystery Club Ancient Astronauts Collector...
- Murder Mystery: Who Killed Linda Neuman? [FINAL]
- Twisted Lands Insomniac Collectors Edition V1.0.0....
- HdO Adventure Around The World In Eighty Days The ...
- Cory's Lunch Rush [FINAL]
- Das Spukhotel (Gegen-Die-Zeit) [DE]
- Build-A-Lot 6 On Vacation [BETA 3]
- Aranjas 3 [Deutsch]
- Homesteader [BETA]
- Verbatim Store 'n' Go Pin Stripe USB Drive
- Health Benefits of Ginger
- Vector characters
- Download Dota 6.72f Map
- Google Alert - CityVille Cheats
- Things people do not tell you
- Efficacy and Benefits of Vegetables Kale
- Reply automatically messages with “Txt Msg Away Me...
- Google Alert - FrontierVille Cheats
- Drivers Ed 2 Online Game - Play Now!
- Cervical Cancer Killer Many Women
- Hide your Facebook Profile From Search Engines
- Bluetooth Security with Link Key Generation
- New plants and old plants
- Bluetooth Security Features
- Is it safe Food We Eat? and Making Food Safe
- Drivers Ed Online Game
- Venus plant becoming fat
- Blow Drying Reduces Moisture in Hair (even with lo...
- Bluetooth Technology Characteristics
- Bluetooth Architecture
- Google Alert - FrontierVille Cheats
- Angry Birds 3-21 Poached Eggs Walkthrough
- Overview of Bluetooth Technology
- Benefits of Watermelon for Health
- Angry Birds 3-20 Poached Eggs Walkthrough
- Angry Birds 3-19 Poached Eggs Walkthrough
- Blow drying DOES dry out your hair
- How to Set Any Picture as Wallpaper on your iPhone
- Web Search on your Iphone: Google or Yahoo!? It's ...
- Double Tap Home Button for Favorites, Music Contro...
- iPhone’s Keyboard Tips & Tricks
- Discover the iPhone’s Hidden Goodness
- Google Alert - FrontierVille Cheats
- Home cinema
- Self esteem improvement - Start now before it is t...
- 10 Myths of Safe Web Browsing
- My Life Story 2: Adventures [FINAL]
- Pahelika Revelations (BETA)
- Haunted Past: Realm of Ghosts [BETA]
- Break the Curse: The Black Pearl Necklace [BETA]
- True Fear: Diamond Queen [BETA]
- 5 Security Threats in HTML5
- Angry Birds 3-18 Poached Eggs Walkthrough
- Google Alert - FrontierVille Cheats
- How to build Your Child's Self Esteem
- How to remove redness on your skin ?
-
▼
August
(237)