587-355-1566 [email protected]

Relying on a Lucky Charm for Internet Security?

Mar 16, 2016 | Security Tips | 0 comments

Relying on a Lucky Charm for Internet Security?

Carrying a lucky charm – four leaf clover might work for leprechauns. But when it comes to Internet abuse by employees, you’re going to need more than sheer luck… Did you know that 70% of all web traffic to Internet forbidden sites occurs during the work hours of 9 am–5 pm. Non-work-related Internet surfing results in up to a 40% loss in productivity each year at businesses.

According to a survey by International Data Corp , 30% to 40% of Internet access is spent on non-work-related browsing, and a staggering 60% of all online purchases are made during working hours. The list goes on, and the costs to your company can be staggering. What types of web sites present the greatest risk?

Categories include Dating, Gambling, Pornography, Profanity, Proxy and Travel.

Risks these types of web sites expose your business to include malware, viruses, fraud, violence, lawsuits, loss of confidential and/or proprietary data and more. Even social sites, while perhaps not quite as risky, can have a major impact on productivity. Barriers that once stood at the edges of your office network have been annihilated by digital media. Web content filtering is now crucial to network security – not to mention employee productivity – in this emerging environment. It can be deployed in a number of ways, but basically they boil down to two: Inline and Endpoint filtering.

Inline Web Filtering One way to filter web content is to control it at the entry point or gateway to your network. This technique intercepts all web traffic and applies filters that allow or block web access requests. Because the entire network is access to the user’s device is required.

With inline web filtering, there’s no need to expend resources managing content at each endpoint – your employees and their computers, whether desktop or mobile. Inline filtering not only saves bandwidth, it goes a long way toward mitigating cyber threats. For securing activities that take place within your network, it’s a critical and potent strategy.

Yet, with the shift away from traditional office-bound work routines to a work-from-anywhere culture, the effectiveness of inline filtering has diminished. When employees access the web outside your network’s gateways – via home networks, hotels, coffee shops, etc. – their devices become vulnerable to attack.

And any employee can carry an infected machine into and out of your company’s building and network on any given day, exposing your entire network to infections. And that’s why so many companies are moving to endpoint-based web filtering to complement their inline filtering.

Endpoint-Based Web Filtering Endpoint-based filtering protects employee devices from infections, no matter where they connect to the web. Software at the endpoint – your employee’s device – carries a predefined filtering policy from the central server that can be internal network-based or cloud-based.

The endpoint filter is then updated periodically from your company network. This method assures that web filtering is always active, no matter which gateway the machine connects through. The downside is that it must be rolled out and maintained at all endpoints.That being said, one advantage of endpoint-based filtering is that it addresses stringent employee privacy regulations that are quickly becoming the norm in Europe and elsewhere around the world. Because it keeps browsing-pattern information within the user’s device, endpoint based filtering provides a fairly non intrusive way to handle employee privacy concerns.

And finally, while endpoint-based filtering really is the only way to protect a network without boundaries, as most companies now have, ideally it works hand in glove with inline filtering.

Forget the Lucky Charm! You can bet on this… We highly recommend rolling out not only inline and endpoint filtering, but also an effective training program for your staff to encourage best practices and assure compliance with your company’s web security policies and procedures.

This IT Security Tip is brought to you by BlackBox Connections.

You Want Secure IT with Fast Response at the Best Price!
We are featured on Page 101 in the March ‘Business in Calgary‘ magazine

Technology Solutions BlackBox Connections
Technology Solutions for Business. IT Support, Security & Website Services.
Send