Five Tips to Reduce Risk From Modern Web Threats

Similar documents
How To Protect Yourself From A Web Attack

Botnets: The dark side of cloud computing

HTML5 and security on the new web

Simplifying Branch Office Security

Protecting Your Roaming Workforce With Cloud-Based Security

Top five strategies for combating modern threats Is anti-virus dead?

Protecting Your Data On The Network, Cloud And Virtual Servers

Sample Mobile Device Security Policy

Sample Data Security Policies

How to stay safe online

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management vs. User Empowerment

The enemy within: Stop students from bypassing your defenses

Simple Security Is Better Security

The Importance of Patching Non-Microsoft Applications

Next Gen Firewall and UTM Buyers Guide

Portal Recipient Guide

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Seven for 7: Best practices for implementing Windows 7

Spyware. Summary. Overview of Spyware. Who Is Spying?

Sophos UTM Software Appliance

MyReports Recommended Browser Settings MYR-200a

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Two Great Ways to Protect Your Virtual Machines From Malware

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Encryption Buyers Guide

Complete Patch Management

Why The Security You Bought Yesterday, Won t Save You Today

Guideline for Prevention of Spyware and other Potentially Unwanted Software

WEB ATTACKS AND COUNTERMEASURES

Sizing Guideline. Sophos UTM SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances

How To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac (

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

Managing BitLocker With SafeGuard Enterprise

Wireless network security: A how-to guide for SMBs

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

What Do You Mean My Cloud Data Isn t Secure?

NATIONAL CYBER SECURITY AWARENESS MONTH

Spyware: Securing gateway and endpoint against data theft

Fighting Advanced Threats

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

BYPASSING THE ios GATEKEEPER

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Perception and knowledge of IT threats: the consumer s point of view

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Enterprise Apps: Bypassing the Gatekeeper

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Certified Secure Computer User

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

The Sophos Security Heartbeat:

What you need to know to keep your computer safe on the Internet

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Stopping zombies, botnets and other - and web-borne threats

Recommended Practice Case Study: Cross-Site Scripting. February 2007

10 Quick Tips to Mobile Security

What's the difference between spyware and a virus? What is Scareware?

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Advanced Persistent Threats

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Basic Security Considerations for and Web Browsing

Sales Consultant I Engineer I Architect I Support Engineer I MSP. A Simple Overview to Training and Certification

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Mobile Device Security: What s Coming Next?

How to Use Windows Firewall With User Account Control (UAC)

Protecting personally identifiable information: What data is at risk and what you can do about it

2X Cloud Portal v10.5

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Sophos XG Firewall Licensing

Top tips for improved network security

Advanced Persistent Threats: Detection, Protection and Prevention

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

General Security Best Practices

Sophos Endpoint Security and Control Help

Transcription:

Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert systems into botnets or steal sensitive data. To meet these challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web protection solution. This guide covers five key tactics you should implement to reduce your risk and keep ahead of threats as much as possible.

Five tips Threats from the web are constantly changing. At SophosLabs we re seeing more than 30,000 newly infected websites every day. And the threats are not only becoming more widespread, but also more sophisticated. Fortunately, you can improve your web protection by observing some best practices. Follow these five tips to reduce your risk and stay ahead of the threats. 1. Keep your systems patched and up to date 2. Standardize your web software 3. Secure your browsers 4. Enforce a strong password policy 5. Use an effective web protection solution 1. Keep your systems patched and up to date Keeping systems fully up to date including the operating system, web browsers, browser plugins, media players, PDF readers and other applications can be a time-consuming, never-ending task. Yet patching is incredibly effective 90% of attacks can be prevented with an existing patch. Most web malware comes from commercially available exploit packs that target unpatched systems. These packs contain dozens of different vulnerability testers and exploit code to find and attack vulnerabilities. The most common targets for these web-based exploit packs are web browsers such as Internet Explorer, Firefox, Safari, Chrome and Opera. Other targets include common crossbrowser plugins such as PDF readers, Flash players, QuickTime and Java. Patches are critical to the security and efficient operation of your IT infrastructure, so it s worth making an investment in system patches. One way to make patching easy is to keep auto-updating turned on for applications that support it. You should encourage your users to apply all updates as soon as they are prompted. And look at investing in a patch management solution that integrates with your desktop security to work better together to help identify and prioritize the most critical security patches. 1

2. Standardize your web software The more platforms and software you have, the more opportunities you give hackers to find vulnerabilities in unpatched applications. Patching becomes more difficult if you don t know what software is running on your network, or you have no control over which browsers, plugins and media players employees use. Limit the number of Internet tools, applications and plugins in your organization to a standardized set and enforce their use as policy. Your policy should require users to access the Internet with a common set of tools that meet these minimum requirements: Browser: Stick with a single mainstream browser that supports Google s Safer Browsing API such as Chrome, Firefox or Safari. Popular browsers invite more exploits but their vendors also have more resources to address vulnerabilities and provide patches more often. PDF reader: Use a single mainstream PDF reader. Keep it patched with the auto-update feature enabled, and advise users to install patches as soon as they become available. Java: Unless you require Java for business-related web applications, disable or remove it from your users computers, or limit it to only those who require it. Media player: Avoid unnecessary media player add-ons and codec packs. If possible, stick with what your operating system provides and keep your OS patched. Plugins, add-ons and toolbars: Avoid unnecessary browser plugins and toolbars. They only increase the attack surface area. You can block unnecessary browser add-ons by configuring the browser with the settings shown in Figure 1. Figure 1: Use settings to control add-ons 2

3. Secure your browsers Familiarize yourself with the security, privacy and content settings that all browsers have in order to understand the trade-offs between security and usability. Some settings merely increase the level of prompting annoying users without adding any tangible security while others can be important to limiting exploits and threats. Set up your browsers accordingly. Here are some common browser elements you can control through settings, and the tradeoffs involved. Cookies: Cybercriminals can exploit cookies in some malicious ways, but they are an important component of Internet usability. Turning them off altogether is not a viable option, but it s important for you to control third-party cookie activity. To check that your browser is blocking third-party cookies, use settings such as the one shown in Figure 2. Autocomplete: The autocomplete or autofill feature saves keystrokes by storing information you recently typed, such as search terms, recently visited websites and your personal information (e.g., name, email, address, phone number). Although this data is obfuscated, some malware targets autocomplete data in order to steal passwords or other personally identifiable information. Additionally, using autocomplete for login information poses a big risk if you your laptop is lost or stolen, allowing criminals to access your accounts. Figure 2: Block third-party cookies 3

Add-ons: Configure your browsers to prevent them from installing add-ons such as plugins, ActiveX controls, toolbars and browser helper objects without a prompt. Remember to restrict add-ons to an absolute minimum in order to reduce the attack surface area for exploits. However, if your security vendor supplies add-ons for your browser, make sure you don t disable them. They can provide valuable pre-execution analysis of browser code. Content filters: Your users are well protected when they re on a corporate network with a proper web security solution (see point number 5). But you should filter content for users operating remotely, such as at home or at a Wi-Fi hotspot. Most popular browsers employ a database of phishing and/or malware sites to provide protection from the most ubiquitous threats. Make sure that your users enable content filters on their browsers (see Figure 3). And look at getting a complete web protection and URL filtering solution that can enforce policy on your users computers no matter where they are. Popup blockers: Popups are not only annoying resource hogs, but they also can host embedded malware directly or lure users into clicking on something using social engineering tricks. For example, some popups can be ingeniously crafted to look like Windows dialog boxes, and the mere act of clicking the X to close the box can unleash a malware attack. Be sure that your selected browser has popup blocking enabled (see Figure 4) and make users aware of the dangers of interacting with any kind of popup. Figure 3: Enable filters on browsers to protect against malware and web threats Figure 4: Make sure popup blocker is turned on 4

4. Enforce a strong password policy The purpose of a password policy should be obvious: to permit access only to authorized users. Weak passwords make it easy for hackers to guess or crack them. Despite this enormous vulnerability in every system, many organizations fail to take this threat seriously. And since strong passwords are difficult to remember, offer users a secure password management utility like LastPass or 1Password. The worst kind of password is one that s written on a sticky note posted to their cubicle wall or hidden under their keyboard. You should enforce policies for creating an effective password, following these guidelines: Use long passwords. The more characters they contain, the more secure they are. Include numbers, symbols, and upper- and lowercase characters. Don t use common dictionary terms. The first thing hackers do to crack an account is try every word in the dictionary. Don t use personal information such as pet, romantic, family or other names, or birthdays. Change passwords frequently. Abide by simple and effective password policies both at work and at home. 5. Use an effective web protection solution A proper web protection solution reduces your threat exposure by limiting users surfing activity to website categories relevant to their work, or at least restricting access to the categories (adult, gambling, etc.) that are a breeding ground for malware. It also protects you from trusted sites that may become hijacked at any time to silently spread malware to unsuspecting visitors. Finally, it protects your Internet resources from abuse as a result of the exchange of illegal content or bandwidth-sapping streaming media. Your web protection solution should offer these capabilities: Productivity and reputation filtering establishes acceptable user policy, limits threat exposure from notoriously malicious site categories, and filters out sites with bad reputations regardless of category. Proxy filtering prevents users from bypassing web filtering and putting themselves and the organization at serious risk. 5

Advanced web malware scanning catches malware as it s downloaded from hijacked trusted sites using advanced techniques like JavaScript emulation to catch the latest obfuscated or polymorphic threats. HTTPS filtering secures an increasingly important vector that evades most web filtering solutions. Content-based filtering reduces the threat surface area from file types associated with malware and controls bandwidth consumption. Protection everywhere so that even users outside the corporate network are fully protected, wherever they go. Interested in learning more? Get our free guide to the Five Stages of a Web Malware Attack Download now Secure Web Gateway Get a free trial at sophos.com/web United Kingdom and Worldwide Sales Tel: +44 (0)8447 671131 Email: sales@sophos.com North American Sales Toll Free: 1-866-866-2802 Email: nasales@sophos.com Australia and New Zealand Sales Tel: +61 2 9409 9100 Email: sales@sophos.com.au Asia Sales Tel: +65 62244168 Email: salesasia@sophos.com Oxford, UK Boston, USA Copyright 2013. Sophos Ltd. All rights reserved. Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. 09.13NP.wpna.simple