Secure Browsing - How an Employee puts a Business at Risk

DANIEL MILLER on June 08, 2016 | 2724

These days, businesses everywhere are increasingly vulnerable to targeted attacks and malware infections. In fact, a company’s own employees often put the business at risk (usually unintentionally), either by browsing an untrusted website or just by clicking on a link in an email that brought them to a compromised site. The bottom line is that when employees browse the Internet, they are apt to expose their organization to malware infections and cyber- attacks.

In terms of successful hacks, one well-known incident involved the illustrious website. A vulnerability instance in WordPress was exploited, and this resulted in the attackers’ ability to insert their malicious code “for delivery via the ‘trusted’ site.”

According to a 2015 Vulnerability Report, attacks are rising in number and severity with each passing year. Scanning over 1.75 million URLs from over 750,000 unique domains, the report shows that a significant percentage of the Web is either currently compromised or at risk:

  • One in three of the top one million Alexa domains -is “risky” – meaning that –it is either already compromised or running vulnerable software
  • More than one in twenty sites were identified by 3rd-party domain classification services as serving malware, spam or are part of a botnet
  • 21% of sites were running software with known vulnerabilities.

The “not so innocent” email

With today’s sophisticated malware a user's computer can be compromised just by opening an email, downloading a document or navigating to a website. Once an endpoint has been compromised, then an attack can quickly spread inside and outside the user’s organization.

Some organizations have dedicated PCs for external browsing. Some forbid it completely. Some implement all kinds of firewalls and malware detectors. Even though, in today’s connected world, eliminating access to the Web should not be an option. Opening the organization to the Web is an important risk, it is also mandatory for job positions that rely heavily on the internet.

Ericom’s approach is to provide a secure browsing experience that maintains the user's normal browsing behavior. The browsing takes place using a virtual browser that is located outside the company, thereby isolating both the endpoint and the corporate network from the security hazards of the Internet. In case of a threat, the browser is contained within the virtual session and remains inaccessible to the user devices, and is later destroyed along with the entire browsing session once the browser tab is closed or times out. Click here to request a demo of Ericom’s secure browsing solution that ensures employees keep sensitive information within the corporate network while still enabling a standard browsing experience.

Internet surfing separation
Endpoint protection best practices
Antivirus vs endpoint protection
Virtual browser security

Author | 40 Blog Posts

Daniel Miller

Senior Director of Product Marketing | Ericom Software

Recommended Articles