Web-based threats: More prevalent, stealthy and changing constantly

Lysa Myers
Lysa Myers
The web is as much of an operating system as Windows, Linux, UNIX or OS X. Use your browser as a chat client, a word processor, or a social networking and file sharing platform: Almost anything you can do outside the browser, you can do on the web.

But those who would profit from cybercrime can harness that web power, too. That is, a threat that once had been the exclusive domain of a particular application now potentially becomes a web threat too.

IT managers must walk a fine line of providing an open, collaborative network environment, and protecting the enterprise. The primary difficulty is the increased granularity required for determining what sites are malicious – in the past, a few simple rules were adequate protection, but malware authors have found many new ways to work mischief, and can infect even seemingly invulnerable servers for legitimate sites. Their attacks are silent, background processes – the user is not aware the attack is occurring. The malicious code foisted on end user's machine transforms it into a zombie -- a member of a botnet – or steals data with every keystroke.

Organizations cannot predict when the next threat will emerge and in what form – prior planning and preparation to protect your organization is essential. Traditional security measures require augmentation and multilayered protection at the internet gateway, on the network, and on the desktop. However, knowing which product best fits an organization's need is only the first step. Because the way vendors deal with malicious URLs differs significantly, evaluating the quality of the security vendors' research capabilities is key.



Sign up to our newsletters

More in Opinions

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Me and my job: Blake Frantz, Center for Internet Security

Me and my job: Blake Frantz, Center for ...

A brief Q&A with Blake Frantz, director of benchmark development, security benchmarks division, Center for Internet Security (CIS).

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.