Web-based threats: More prevalent, stealthy and changing constantly

Lysa Myers
Lysa Myers
The web is as much of an operating system as Windows, Linux, UNIX or OS X. Use your browser as a chat client, a word processor, or a social networking and file sharing platform: Almost anything you can do outside the browser, you can do on the web.

But those who would profit from cybercrime can harness that web power, too. That is, a threat that once had been the exclusive domain of a particular application now potentially becomes a web threat too.

IT managers must walk a fine line of providing an open, collaborative network environment, and protecting the enterprise. The primary difficulty is the increased granularity required for determining what sites are malicious – in the past, a few simple rules were adequate protection, but malware authors have found many new ways to work mischief, and can infect even seemingly invulnerable servers for legitimate sites. Their attacks are silent, background processes – the user is not aware the attack is occurring. The malicious code foisted on end user's machine transforms it into a zombie -- a member of a botnet – or steals data with every keystroke.

Organizations cannot predict when the next threat will emerge and in what form – prior planning and preparation to protect your organization is essential. Traditional security measures require augmentation and multilayered protection at the internet gateway, on the network, and on the desktop. However, knowing which product best fits an organization's need is only the first step. Because the way vendors deal with malicious URLs differs significantly, evaluating the quality of the security vendors' research capabilities is key.



More in Opinions

Follow me on this, your security team includes non-security people

Follow me on this, your security team includes ...

A successful security professional will tap into an organization's entire employee base to get results. And the benefits will go both ways.

Me and my job: Marty Edwards, ICS-CERT

Me and my job: Marty Edwards, ICS-CERT

Marty Edwards' job is to coordinate efforts between the government and the private sector.

Debate: Is advanced malware no longer a problem when administrator rights are ...

In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.