Employee Internet Usage Puts Your Business at Risk

Employee Internet Usage Puts Your Business at Risk
Every time employees use the Internet, they put the security of your
network and sensitive business data at risk.
Employees are using the Internet inappropriately
Employees are shopping, sharing content peer-to-peer, and visiting
social networking, dating and adult sites. This use puts your company’s
productivity and reputation in jeopardy and increases the risk of
Hackers have learned to
use legitimate sites as
bait for “social
engineering” tactics,
tricking users into
clicking an embedded
Internet-based threats to your data network. Adult sites are notorious
link or an email
for hosting malware. The taboo nature of the sites is such that users
attachment. This
remain silent about visiting them, even if they suspect their system has
happened with Facebook
been infected. Meanwhile, online shopping sites are often the source of
in December 2008.
spyware, or feature links to third-party sites that may not be
trustworthy.
Inappropriate use is more prevalent than you may think. Data collected by PricewaterhouseCoopers, on
behalf of the United Kingdom’s Department of Business Enterprise & Regulatory Reform (BERR), reveals
that as many as one in six businesses experienced staff misuse of their information systems in the past
year. In the cases reported, approximately 36 percent were spending an excessive amount of time
browsing the Internet, and an additional 41 percent accessed inappropriate websites.
Legitimate sites pose the biggest threat to your data
Even when used appropriately by your employees, the Internet is the primary source for threats such as
spyware, trojans, bots, backdoors, and rootkits. In many cases, simply visiting a site triggers the
infection. This method of transmission, called a “drive-by download”, occurs without the user’s
knowledge at all.
NETGEAR® ProSecure has found that 79 percent of threats were on legitimate sites hijacked by hackers.
In the first quarter of 2008, the websites of thousands of Fortune 500 companies, government
agencies and schools were infected with malicious code, including security vendors such as Symantec,
Trend Micro, and Computer Associates.
Hackers have learned to use legitimate sites as bait for “social engineering” tactics, tricking users into
clicking an embedded link or an email attachment. This happened with Facebook in December 2008.
Members received an email with the subject line “You look funny in this new video” and an embedded
link to view it. The link led them to a non-Facebook video site where they were prompted to update
their Flash player to see the video. Clicking the prompt installed a worm on the user’s system. In
addition to containing spyware, the worm opened a backdoor that would enable private information to
be sent from the system and code to be installed on it in the future.
Meanwhile, the remaining 21 percent of security threats are the result of users inadvertently visiting
rogue websites designed to appear legitimate. Many incorporate search engine marketing and banner
advertisements to increase the number of visitors. By developing rogue sites, attackers have more
control over the threat. Either way, it’s clear that blocking sites based on content is no longer an
effective way to protect your company from threats.
Steps to protect your business
The first line of defense against such threats is to create and enforce an acceptable Internet use policy.
Your policy should cover both the amount of time employees are allowed to spend on personal
business online and the type of sites they are allowed to visit.
Next, install a strong gateway security appliance that includes URL and content filtering, and bidirectional traffic inspection. When employees attempt to visit a banned site, or one with content
prohibited by your company, the transmission is blocked, and a report is sent to IT. The real-time bidirectional traffic inspection adds a critical layer of defense. It proactively monitors inbound and
outbound traffic for malware every time an employee visits a URL that hasn’t been blocked. If an
employee inadvertently lands on a legitimate site that has been hacked, or a rogue site that appears
legitimate, the inbound traffic triggers the appliance, which blocks the network transmission.
Conclusion
Every internet-connected company faces daily web-based security threats. The risk of infection is
exponentially greater if you lack comprehensive gateway security. Implementing acceptable usage
policies and proactive, real-time bi-directional traffic inspection will significantly reduce your risk.
NETGEAR, the NETGEAR logo, Connect with Innovation and ProSecure are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its subsidiaries in the United States and/or other
countries. Other brand names mentioned herein are for identification purposes only and may be trademarks of their respective holder(s). Information is subject to change without notice.
© 2010 NETGEAR, Inc. All rights reserved.