Page 32 - Cyber Warnings August 2017
P. 32

Cyberthreat Vulnerabilities Prompt Radical Approach for

               Internet Security

               By Joshua Behar

               Cyberthreats come in all shapes and sizes, and continue to stretch enterprise security
               resources and IT budgets. Most recently, HBO fell victim to a cyberattack when the network's
               email system had been partially compromised. This year we have seen many sophisticated
               ruses decimate organizations from WannaCry and TorrentLocker to the latest Locky variant,
               Diablo6.

               Today, the average user has at least four different computing devices including personal and
               corporate phones, laptops, and desktops, all of which require network access. Each of these
               endpoints, if not properly maintained, can be the weak link which hackers will ultimately find and
               exploit. According to the 2017 Duo Trusted Access Report, about a quarter of all Windows
               devices are running outdated, unsupported versions of Internet Explorer.

               Current security frameworks integrating antivirus, firewalls and other types of “detect and block”
               solutions are reactive in scope and offer a limited degree of protection.


               The intersection of these two factors – a growing number of endpoints combined with reactive tools – is
               challenging today's enterprises, as securing and patching the vast array of endpoints is costly,
               requires an army of IT resources, but most importantly, does not safeguard against Internet-
               borne attacks exploiting the browser.

               As more enterprises embrace mobility and cloud-based applications to run vital business
               functions over the Internet, hackers are finding clever, sophisticated schemes to penetrate web
               browsers, leaving enterprises reeling for new ways to safeguard their data and reputation.

               With Internet-borne threats a single click or download away from compromising day-to-day
               business operations, enterprises need to think differently about how to secure the browsing
               experience across all endpoints.

               Secure Remote Browsing
               Secure remote browsing, also known as browser isolation technology, offers a new and unique
               approach to Web security, mitigating the risk of malware or ransomware. Complementing
               existing security frameworks that focus on the endpoint, remote browsing offers an added layer
               of protection, without compromising the user experience. This new approach provides the
               highest level of security without burdening IT with endpoint installs and costly maintenance.
               Most importantly, users can browse the Internet the way they normally do.

               The market for remote browsing is heating up. Symantec’s recent acquisition of Fireglass further
               validates this assertion. According to Gartner, remote browsing represents a top security
               technology in 2017.




                    32   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   27   28   29   30   31   32   33   34   35   36   37