Securing a safe browsing environment

June 10, 2012

Majority of bloggers and tech journalists always shun writing about browsing and how important it is to all Internet users. Scanning downloaded files for viruses keeps us secure but it’s not going to keep users from getting infected, because of “drive-by” infections. These are a very common type of silent attack that can infect visitors to websites that do nothing else but visit a page  and they won’t even know it’s happened.Over the last two years, hackers have become experts at exploiting websites using techniques like SQL injection to embed malicious code to even the most trusted legitimate websites.The code can be heavily masked, making it extremely difficult for traditional web security solutions to detect, and impossible for desktop antivirus to even see.Once downloaded by the browser, it will secretly download an exploit pack that will seek out dozens of known vulnerabilities in browsers, plugins, applications, or the operating system to install its payload.As a safety measure, ensure you have advanced multi-layered web protection to provide a co-ordinated defence.I recommend you include essential URL filtering and also scan all downloaded website content as it’s accessed.

Also unmask and emulate JavaScript in real time to detect suspicious behavior. Do not rely on signature-based malware detection as it’s completely ineffective at protecting your organization from modern web threats.There’s no such thing as a trusted site anymore because study shows that 80% of infected websites are legitimate trusted sites.Hackers main targets are mainstream,popular, trusted sites to distribute malware and infect victims. You need to make sure you have advanced web malware detection to scan all website content as it’s accessed. This will catch the latest threats, on any site, before it can become a problem.Users also need to have anonymizing proxy protection in their web security solution.Even though Chrome is considered among the most secure, every browser has new vulnerabilities all the time and as a browser like Chrome becomes more popular with users, it has also becomes more of a target to hackers.Use application control to limit the number of browsers supported in your organization. Keep supported browsers fully patched at all times with a vulnerability management solution to keep your risk surface area to a minimum.

Make sure you have advanced web malware detection working to stop threats in real time.Mac OS X is a completely different operating system from Windows, and has many built-in security features.However, smart hackers have found creative ways to infect Mac users with malware. As Macs become more popular at home and in the workplace, they will be targeted more. In my case as one of the Mac users, I had to deploy a Mac antivirus solution.Ideally, the solution should be lightweight and easy to manage alongside your other platforms. And it should be backed by global threat analysis that actively monitors Mac threats. Make sure your Mac applications and add-ons are fully patched and up to date at all times to reduce the number of potential vulnerabilities.I urge that as a user, you should adopt a web protection solution that integrates web security directly into the endpoint on all your laptops,keeping your road warriors, remote workers, and other offsite users safe wherever they happen to be.You’ll keep users secure while still having complete visibility and policy control over users everywhere they go. In conclusion, a successful web protection solution combines the best elements of endpoint, cloud and gateway solutions to provide a better, more secure web experience. Look for a solution that integrates web protection into the endpoint to provide complete web protection everywhere users go.

Contador Harrison