CHECK POINT 2013 SECURITY REPORT
03
_ APPLICATIONS IN THE ENTERPRISE WORKSPACE
027
Recommendations for Securing Web
Application Usage in your Network
Enabling Effective Web 2.0 Protection?
The first step to secure web applications usage in an
organization is to use a security solution that provides
control and enforcement for all aspects of web usage. Full
visibility of all applications running in the environment
is needed, along with the ability to control their usage.
This level of control has to be maintained over client
applications such as Skype, and also over more traditional
URL-based aspect of the web such as websites. As many
sites enable the operation of numerous applications based
on their URLs (e.g. Facebook runs Facebook chat and
other gaming applications through the Facebook URL),
it is essential to have granularity beyond the URL level.
Once this is achieved, organizations should be able to
effectively block applications that can endanger their
corporate security.
Enabling Social Media for Businesses
There are situations where organizations block Facebook
access entirely. But Facebook is considered to be an
essential business tool for many businesses as companies
often publish information about upcoming webinars,
events, new product-related articles, pictures and videos
on their corporate Facebook page. Thus a total social
media ban would negatively impact business performance.
So the question then becomes: How can companies
enable social media usage in the workplace without
compromising system security? The answer lies in
controlling features and widgets within social media apps
and blocking out the less business-relevant portions of
the program. The combination of these actions makes
it possible for corporations to utilize social media with
minimal security risks.
the hacker sent the following message to all of the account’s
followers. "Exactly what were you doing inside this film
[Facebook-URL]… wow disturbing”.
The URL pointed to a Facebook app which required
“Twitter Login”. The login screen was actually a web
server owned by the hacker that was used to harvest the
recipient’s Twitter credentials.
The hacker can repeat the process by using the newly
hacked Twitter accounts to steal even more passwords.
The hacker can also use the stolen credentials to access
other services such as Gmail, Facebook, etc. Even
worse, stolen personal credentials can be used to log
into bank accounts or business-related services such as
SalesForce.
After the malicious message was redistributed to the
followers of the hacked account, the only effective
recourse was to post a polite apolog y.