where developers meet development
Thursday,September 21,2017

EXCLUSIVES 

Businesses Shunning Web 2.0 Security

Picture Holder1

A local industry survey conducted this month has revealed a startling paradox between the acknowledged security threat of Web 2.0 applications and the access given to everyday users during business hours. While 92 per cent of respondents claimed to allow their employees access to Web 2.0 applications such as social networking, blogs and wikis, 71 per cent considered the consumer technology typically used to access these services as security threats.

 

The survey, which sampled high-level decision makers, managers, Web specialists, system analysts and engineers at a Web 2.0 security seminar hosted by Sydney-based enterprise content management company, Elcom, and IT systems integrator Regal IT, also showed that 47 per cent of companies were not increasing their spend on security despite the perceived threat.

 

“Most of the people we surveyed said they were comfortable with their current security platforms, which suggests we're on the right road when it comes to the platforms we're building,” said John Anstey, CEO, Elcom. “That doesn't mean we should become complacent about security, and I think the current economic situation we find ourselves in could well be a mitigating factor in companies' hesitation on spending more, despite the threat. What this does is elevate the risk level for everyone, so as an industry we have to stay on our guard and make sure we continue to follow best practices when it comes to developing Web platforms and deploying Web 2.0 applications.” Anstey's comments were backed up by security firms Websense and Sense of Security, who presented at the briefing. Phil Vasic, ANZ country manager for Websense, said that in the last six months criminals have really stepped up their game in a few notable areas.

 

“Spammers are increasingly using links to malicious Web sites and spam sites in their email campaigns to lure users and evade security systems that lack Web intelligence,” said Vasic.

 

“We're also seeing an increase in cybercriminals taking advantage of the growing number of Web 2.0 properties that allow user-generated content. More than ever we're seeing attackers inject Web sites with links and iFrames to direct users to malicious and compromised sites with the ultimate purpose of stealing data.” Sense of Security's Murray Goldschmidt said a major threat comes from corporations developing and deploying applications, which are not securely coded, that end up being vulnerable to attack and are easily exploited. “The current top Web 2.0 security risks are similar to those we have seen for many years in more traditional Web applications,” he said.

 

“You need to get down to the basics and design applications from the ground up with a security mindset. In other words, when developing or deploying Web 2.0 applications, you need to understand the purpose of the application, embrace the benefits and cover all the attack vectors through appropriate controls and sound security principles.”

 

Regal IT managing director Mark Gluckman had a more sobering view: “the biggest risk companies face is their own staff.” “IT departments can always upgrade to the newest and best security technologies, but it’s their own people that will always be the weakest link,” he said. “Cybercriminals will always manage to find ways to attract people using new and appealing methods, using this to gather or alter important information. Companies need to decide what data is important and ensure that this data is protected from theft and any sort of unauthorised changes. These technologies are available, at a price, and companies will need to consider the balance between the value of their data, value of its loss to the company, and the cost of protecting it.”

 

The survey showed the most popular Web 2.0 application to be social networking (51 per cent), followed closely by wikis (49 per cent) and blogs (38 per cent).

Register to DeveloperMarch

Be part of DeveloperMarch and get updates on upcoming events. Youcan register with the form below:

FirstName*
LastName*
Company*
Country*
Job Title*
Phone Number*
Email*
UserName*
Password*
Confirm Password*
To:
Name:*
E-mail address:*
Your Details:
Your name: *
E-mail address: *
Message:
Software Supportby Advanced Millennium Technologies

Advanced Millennium Technologies. Expertise in software development, offering consultancy services, Open source programming, CRM - Customer Relationship Management, CMS - Content Management System , ERP - Enterprise Resource Planning and Ecommerce development, AJAX, PHP, .NET, J2EE, SOA, XSLT, DOJO toolkit development and software testing. A robust onsite-offshore model. A well-defined global delivery model. AMT Outsourcing center. www.amt.inTAROBY - The E-Mail Dashboard for EntrepreneursTaroby is a SaaS based messaging and collaboration suite inbox that enables sharing of email accounts among team members. The unique concept of 'Team Inbox' makes Taroby an excellent enterprise collaboration suite for enterprises. Taroby is an effective tool for CEO's and entrepreneurs to manage multiple departments or manage multiple projects under them. The team inbox gives the entrepreneurs an overview of what is happening their business and give a quick snap shot of the employees who is responcible for handling the tasks/emails. For team members taroby brings in transparency and efficiency in their teams. Taroby improves the internal and external communication in an organization. Using the Taroby's Team Inbox also helps in reducing the usage of disc space and there by helping the enterprises to reduce carbon footprints.