{"id":14499,"date":"2019-02-05T09:10:04","date_gmt":"2019-02-05T17:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/05\/news-8251\/"},"modified":"2019-02-05T09:10:04","modified_gmt":"2019-02-05T17:10:04","slug":"news-8251","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/05\/news-8251\/","title":{"rendered":"How to browse the Internet safely at work"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 05 Feb 2019 16:00:44 +0000<\/strong><\/p>\n<p><em>This Safer Internet Day, we teamed up with ethical hacking and web application security company\u00a0<a href=\"https:\/\/detectify.com\" target=\"_blank\" rel=\"noopener\">Detectify<\/a> to provide security tips for both workplace Internet users and web developers. This article is aimed at employees of all levels. If you\u2019re a programmer looking to create secure websites, visit Detectify&#8217;s blog to read their <a href=\"https:\/\/blog.detectify.com\/2019\/02\/05\/guide-http-security-headers-for-better-web-browser-security\/?utm_source=malwarebytes&amp;utm_medium=referral&amp;utm_campaign=HTTP_Headers\" target=\"_blank\" rel=\"noopener\">guide to HTTP security headers for web developers<\/a>.<\/em><\/p>\n<p>More and more businesses are becoming security- and privacy-conscious\u2014as they should be. When in years past, IT departments&#8217; pleas for a bigger cybersecurity budget fell on deaf ears, this year, things have started looking up. Indeed, there is nothing quite like <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/2018-the-year-of-the-data-breach-tsunami\/\" target=\"_blank\" rel=\"noopener\">a lengthening string of security breaches<\/a> to grab people\u2019s\u2014and executives\u2019\u2014attention.<\/p>\n<p>Purely reacting to events is a <span style=\"text-decoration: line-through\">bad<\/span> <em>terrible<\/em> approach, and organizations who handle and store sensitive client information have learned this the hard way. It not only puts businesses in constant firefighting mode, but is also a sign that their current cybersecurity posture may be inadequate and in need of proper assessment and improvement.<\/p>\n<p>Part of improving an organization\u2019s cybersecurity posture has to do with increasing its employees&#8217; awareness. Being their first line of defense, it\u2019s only logical to <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/create-sticky-cybersecurity-training-program\/\" target=\"_blank\" rel=\"noopener\">educate users about cybersecurity best practices<\/a>, as well as the latest threats and trends. In addition, by\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/03\/how-to-create-a-successful-cybersecurity-policy\/\" target=\"_blank\" rel=\"noopener\">providing users with a set of standards<\/a> to adhere to, and maintaining those standards, organizations can\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/how-to-create-intentional-culture-of-security\/\" target=\"_blank\" rel=\"noopener\">create an intentional culture of security<\/a>.<\/p>\n<p>Developing these training regimens requires a lot of time, effort, and perhaps a metaphorical arm and a leg. Do not be discouraged. Companies can start improving their security posture <em>now<\/em> by sharing with employees a helpful and handy guide on how to safely browse the Internet at work, whether on a desktop, laptop, or mobile phone.<\/p>\n<h3>Safe Internet browsing at work: a guideline<\/h3>\n<p>Take note that some of what\u2019s listed below may already be in your company\u2019s Employee Internet Security Policy, but in case you don\u2019t have such a policy in place (yet), the list below is a good starting point.<\/p>\n<p><strong><em>Make sure that your browser(s) installed on your work machine are up-to-date.<\/em><\/strong> The IT department may be responsible for updating employee operating systems (OSes) on remote and in-house devices, as well as other business-critical software. It may not be their job, however, to update software you&#8217;ve installed yourself, such as your preferred browser. The number one rule when browsing the Internet is to make sure that the browser is up-to-date. Threats such as malicious websites, <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/malvertising\/\" target=\"_blank\" rel=\"noopener\">malvertising<\/a>, and exploit kits can find their way through vulnerabilities that out-of-date browsers leave behind.<\/p>\n<p>While you&#8217;re at it, updating other software on your work devices keeps browser-based threats from finding other ways onto your system. If IT doesn&#8217;t already cover this, update your file-compressor, <a href=\"https:\/\/www.malwarebytes.com\/premium\/\" target=\"_blank\" rel=\"noopener\">anti-malware program<\/a>, productivity apps, and even media players. It&#8217;s a tedious and often time-consuming task, but\u2014shall we say\u2014updating is part of owning software. You can use a <a href=\"https:\/\/www.lifewire.com\/free-software-updater-programs-2625200\" target=\"_blank\" rel=\"noopener\">software updater program<\/a> to make the ordeal more manageable. Just don&#8217;t forget to update your updater, too.<\/p>\n<p><strong><em>If you have software programs you no longer use or need, uninstall them.<\/em><\/strong> Let&#8217;s be practical: There\u2019s really no reason to keep software if you&#8217;ve stopped using it or if it&#8217;s just part of <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/bundler\/\" target=\"_blank\" rel=\"noopener\">bloatware<\/a> that came with your computer. It\u2019s also likely that, since you\u2019re not using that software, it&#8217;s incredibly outdated, making it an easy avenue for the bad guys to exploit. So do yourself a favor and get rid. That&#8217;s one less program to update.<\/p>\n<p><strong><em>Know thy browser and make the most of its features.<\/em><\/strong>\u00a0Modern-day browsers like Brave, Vivaldi, and Microsoft Edge have\u00a0launched quite a bit differently than their predecessors. Other than their appealing customization schemes, they also boast of being secure (or private) by default. By contrast, browsers that have been around for a long time continue to improve on these aspects, as well as their versatility and performance.<\/p>\n<p>Regardless of which browser you use, make it a point to review its settings (if you haven&#8217;t already) and configure them with security and privacy in mind. The US-CERT has more detailed information on how to secure browsers, which you can read through <a href=\"https:\/\/www.us-cert.gov\/publications\/securing-your-web-browser\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong><em>Refrain from visiting sites that your colleagues or boss would frown upon if they look over your shoulder.<\/em><\/strong>\u00a0Most employees know that visiting and navigating to sites that are not safe for work (NSFW) is a no-no, but they still do it. Trouble is, not only does this welcome malware and other threats that target visitors of such sites, but it could also result in being\u2014rightfully or not\u2014accused of <a href=\"https:\/\/www.thebalancecareers.com\/sexual-harassment-1918253\" target=\"_blank\" rel=\"noopener\">sexual harassment<\/a>. Browsing sites of a pornographic nature could make coworkers incredibly uncomfortable, and if this behavior is generally tolerated by the brass, it could result in the company becoming the subject of a <a href=\"https:\/\/www.thebalancecareers.com\/sexual-harassment-claims-1918632\" target=\"_blank\" rel=\"noopener\">hostile environment claim<\/a>. So if hackers don&#8217;t scare you, maybe a lawsuit will.<\/p>\n<p><strong><em>Use a password manager.<\/em><\/strong> It may sound like this advice is out of place, but we include it for a reason. Password managers don\u2019t just store a multitude of passwords and keep them\u00a0safe. They can also stop your browser from pre-filling fields on seemingly legitimate, but ultimately malicious sites, making it an unlikely protector against phishing attempts. So the next time you receive an email from your &#8220;bank&#8221; telling you there&#8217;s a breach and you have to update your password, and your password manager refuses to pre-fill that information, scrutinize the URL in the address bar carefully. You might be on a site you don&#8217;t want to be on.<\/p>\n<hr \/>\n<p style=\"text-align: center\"><em>Read: <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">Why you don&#8217;t need 27 different passwords<\/a><\/em><\/p>\n<hr \/>\n<p><strong><em>Consider installing apps that act as another layer of protection.<\/em><\/strong> There is a trove of fantastic browser apps out there that a privacy- and security-conscious employee can greatly benefit from. Ad blockers, for instance, can strip out ads on sites that have been used by malicious actors before in\u00a0malvertising campaigns. Tracker blockers allow one to block trackers on sites that monitor their behavior and gather information about them without their consent. Script blockers disable\u00a0or prevent the execution of browser scripts, which criminals can misuse. Other apps, such as <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/\" target=\"_blank\" rel=\"noopener\">HTTPS Everywhere<\/a>, force one\u2019s browser to direct users to available HTTPS versions of websites.<\/p>\n<p><strong><em>Consider sandboxing.<\/em><\/strong> A sandbox is software that emulates an environment where one can browse the Internet and run programs independently from the actual endpoint. It\u2019s typically used for testing and analyzing files to check if they\u2019re safe to deploy and run.<\/p>\n<p>We\u2019re not saying that employees should know how to analyze files (although kudos if you can). Only that employees who normally open attachments from their personal emails, <a href=\"https:\/\/www.pcworld.com\/article\/206107\/most_dangerous_places_on_the_web.html\" target=\"_blank\" rel=\"noopener\">stumble into sites that may be deemed sketchy at best<\/a>, or want to check out programs from third-party vendors do so in a safe setup that is isolated from their office network. Here is <a href=\"https:\/\/www.geckoandfly.com\/24921\/sandbox-virtual-machine-rollback-windows\/\" target=\"_blank\" rel=\"noopener\">a list of free sandbox software<\/a>\u00a0you can read more about if you\u2019re interested in trying one out.<\/p>\n<p><strong><em>Assume you are a target.<\/em><\/strong> Not many employees would like to admit this. In fact, it may not have crossed their minds until now. A lot of small businesses, for example, would like to think that they cannot be targets of cyberattacks because criminals wouldn&#8217;t go after \u201cthe little guy.\u201d But various surveys, intelligence, and research tell a different story.<\/p>\n<p>Employees need to change their thinking. Each time we go online at work, whether for valid reasons or not, we are putting our companies at risk. So we must take the initiative to browse safely, adopt cybersecurity best practices, and embrace training sessions with open minds. Realize that a lot is at stake in the office environment, and a single mouse click on a bad link could bring down an entire business. Do you want to be the person responsible?<\/p>\n<h3>We\u2019re all in this together<\/h3>\n<p>When it comes to preventing online threats from infiltrating your organization\u2019s network and keeping sensitive company and client data secure, it is true that they are no longer just IT concerns. Cybersecurity and privacy are <em>and<\/em> should be every employee\u2019s concern\u2014from the rank-and-file up to the managerial and <a href=\"https:\/\/www.thebunker.net\/app\/uploads\/2019\/01\/Are-you-the-Weakest-Link-Whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">executive level<\/a>.<\/p>\n<p>Indeed, no one should be exempted from continuous cybersecurity training, nor high-ranking officials should go on thinking that company policies don\u2019t apply to them. If every employee can adhere to the simple guideline above, we believe that organizations of all sizes are already in a better security posture than before. This is just the first step, however. There is still the need for organizations to assess their cybersecurity and privacy needs, so they can effectively invest in tools and services that help better secure their unique work environment. Whatever changes they choose to implement that require employee participation, IT and high-ranking work officials must ensure that everyone is in it together.<\/p>\n<p>Stay safe!<\/p>\n<p>More Safer Internet Day blog posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/02\/safer-internet-day-2018\/\" target=\"_blank\" rel=\"noopener\">Safer Internet Day 2018: ad blockers and anti-trackers<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/02\/celebrate-safer-internet-day\/\" target=\"_blank\" rel=\"noopener\">Celebrate Safer Internet Day<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/how-to-browse-the-internet-safely-at-work\/\">How to browse the Internet safely at work<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/how-to-browse-the-internet-safely-at-work\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 05 Feb 2019 16:00:44 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2019\/02\/how-to-browse-the-internet-safely-at-work\/' title='How to browse the Internet safely at work'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/shutterstock_1245856558.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>This Safer Internet Day, we\u2019re presenting a guideline to employees on how to navigate the online trenches safely, whether they\u2019re on their desktop computers, company-owned laptops, or mobile devices. Who wants to be the one responsible for a breach? No one.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/browser-based-attacks\/\" rel=\"tag\">browser-based attacks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/detectify\/\" rel=\"tag\">detectify<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ethical-hackers\/\" rel=\"tag\">ethical hackers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hackers\/\" rel=\"tag\">hackers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet\/\" rel=\"tag\">internet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/safer-internet-day\/\" rel=\"tag\">safer internet day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-browsers\/\" rel=\"tag\">web browsers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-security\/\" rel=\"tag\">web security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2019\/02\/how-to-browse-the-internet-safely-at-work\/' title='How to browse the Internet safely at work'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/how-to-browse-the-internet-safely-at-work\/\">How to browse the Internet safely at work<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,20002,20844,20845,10520,6272,4314,11228,11114,19251],"class_list":["post-14499","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-browser-based-attacks","tag-detectify","tag-ethical-hackers","tag-fyi","tag-hackers","tag-internet","tag-safer-internet-day","tag-web-browsers","tag-web-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14499"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14499\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14499"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}