Companies and users around the world are struggling to keep their network environments safe from malicious attacks and hijacking attempts by leveraging services provided by high-end firewalls, Intrusion Detection Systems (IDS), antivirus software and other means. While these appliances can mitigate attacks and hacking attempts, we often see the whole security infrastructure failing because of attacks initiated from the inside, effectively by-passing all protection offered by these systems.
I’m sure most readers will agree when I say that end-users are usually responsible for attacks that originate from the internal network infrastructure. A frequent example is when users find a link while browsing the Internet they tend to click on it to see where it goes even if the context suggests that the link may be malicious. Users are unaware of the hidden dangers and the potential damage that can be caused by clicking on such links.
The implications of following links with malicious content can vary for each company, however, we outline a few common cases often seen or read about:
- Hijacking of the company’s VoIP system, generating huge bills from calls made to overseas destination numbers (toll fraud)
- The company’s servers are overloaded by thousands of requests made from the infected workstation(s)
- Sensitive information is pulled from the workstations and sent to the hackers
- Company Email servers are used to generate and send millions of spam emails, eventually placing them on a blacklist and causing massive communication disruptions
- Remote control software is installed on the workstations, allowing hackers to see everything the user is doing on their desktop
- Torrents are downloaded and seeded directly from the company’s Internet lines, causing major WAN disruptions and delays
As you can see there are countless examples we can analyze to help us understand how serious the problem can become.
Download this whitepaper if you are interested to:
- Learn which are the Top 10 Dangerous sites users visit
- Learn the Pros and Cons of each website category
- Understand why web content filtering is important
- Learn how to effectively block sites from compromising your network
- Learn how to limit the amount of the time users can access websites
- Effectively protect your network from end-user ‘mistakes’
- Ensure user web-browsing does not abuse your Internet line or Email servers
We apologise however the whitepaper is no longer available by the vendor. Head to our homepage to read up on new network and security related articles.