{"id":836,"date":"2011-10-11T19:43:13","date_gmt":"2011-10-12T00:43:13","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=836"},"modified":"2011-10-11T19:43:13","modified_gmt":"2011-10-12T00:43:13","slug":"the-top-37-risks-admins-take-with-uncontrolled-internet-usage","status":"publish","type":"post","link":"http:\/\/www.wildow.com\/blog\/?p=836","title":{"rendered":"The Top 37 Risks Admins Take with Uncontrolled Internet Usage"},"content":{"rendered":"<h2><a href=\"http:\/\/networkedblogs.com\/ofw6v\" target=\"_blank\">The Top 37 Risks Admins Take with Uncontrolled Internet Usage<\/a><\/h2>\n<div id=\"stats\">Written by <a title=\"Posts by Emmanuel Carabott\" href=\"http:\/\/www.gfi.com\/blog\/author\/emmanuel-carabott\/\">Emmanuel Carabott<\/a> on October 10, 2011 \u2013 4:00 pm<a href=\"http:\/\/www.gfi.com\/blog\/top-37-risks-admins-uncontrolled-internet-usage\/#respond\">No Comment<\/a><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"web security risks\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2011\/10\/web-security-risks-229x300.jpg\" alt=\"\" width=\"229\" height=\"300\" \/>No one in IT really wants to be the Internet Police \u2013 granted. In fact, the less we know about our colleagues\u2019 web surfing habits, the happier we will probably be. Sometimes there really is such a thing as \u2018too much information\u2019. However, it is our responsibility to safeguard our company\u2019s resources, and that includes both confidential information stored on our server and the workstations that use our network, so we do have to take certain actions to protect ourselves and our coworkers from the worst of the web. The combination of an acceptable usage policy and web filtering software helps guard against the web threats that are out there. What are these \u2018web threats\u2019? There are several risks associated with uncontrolled Internet usage. Below you will find 37 of them, grouped into eight categories. Some could be included in more than one category, and in that case, I have them listed where I think they do the most harm.<\/p>\n<p><!--more--><\/p>\n<h2>Malware<\/h2>\n<p><strong> 1. Viruses<\/strong><br \/>\nMost infected files these days are downloaded from the Internet. Whether the user is trying to get an application for their job or a new screensaver, downloads which have not been scanned become bad news.<br \/>\n<strong> 2. Trojans<\/strong><br \/>\nMany Internet downloads contain remote access Trojans or spam mailers, designed to give bad guys access to your data and resources.<br \/>\n<strong> 3. Cross-site scripting<\/strong><br \/>\nEven with up-to-date antivirus software, visits to infected websites can steal information by tricking users into filling out forms they think are safe, or presenting them with malicious content.<br \/>\n<strong> 4. Tracking<\/strong><br \/>\nComplete privacy on the Internet is not practical, but providing your complete web history to advertisers is not a good idea either.<br \/>\n<strong> 5. Botnets<\/strong><br \/>\nInfected computers often become zombies, reaching out to contact the command and control servers for orders.<br \/>\n<strong> 6. Spyware and adware<\/strong><br \/>\nKeyloggers, browsing history, and pop-up ads, are all part of the fun of surfing to the wrong places on the web today.<\/p>\n<h2>Phishing sites<\/h2>\n<p><strong>7. Identity Theft<\/strong><br \/>\nMany phishing sites ask for personal information in order to assume the identity of the victim.<br \/>\n<strong> 8. Financial loss<\/strong><br \/>\nOther phishing sites may be after credit card or bank account details for immediate financial gain.<br \/>\n<strong> 9. Social engineering<\/strong><br \/>\nThere are sites out there trying to gain usernames and passwords to webmail, online banking, and remote access systems, with which they can access for further nefarious deeds.<\/p>\n<h2>Inappropriate content<\/h2>\n<p><strong> 10. Pornography<\/strong><br \/>\nWhat users do at home is their own business; what they do at work could get the company sued.<br \/>\n<strong> 11. Racial hatred<\/strong><br \/>\nIt\u2019s a shame that in 2011 racism is still rife and this can lead to a hostile work environment suit.<br \/>\n<strong> 12. Religious intolerance<\/strong><br \/>\nMuch like racial hatred, religious intolerance of any faith has no place at work, and could also lead to a hostile work environment.<br \/>\n<strong> 13. Alcohol, tobacco and drug related sites<\/strong><br \/>\nUnless you work in the industry, there is little chance these topics are work related, but if the arise within the workplace, they could cause tension among employees.<\/p>\n<h2>Data loss prevention<\/h2>\n<p><strong> 14. WikiLeaks type sites<\/strong><br \/>\nThe company\u2019s confidential information won\u2019t stay confidential for long if it is posted to a public site and makes the evening news.<br \/>\n<strong> 15. Forums<\/strong><br \/>\nDisgruntled employees may think they are harmlessly venting when the rant on a forum, but the company\u2019s reputation may suffer as a result.<br \/>\n<strong> 16. Blogs<\/strong><br \/>\nCompany approved blogs are good; technical blogs are too. But a user blogging at work (unless that\u2019s their job) is wasting time, and might be posting confidential information not yet ready for public release.<br \/>\n<strong> 17. Instant messaging<\/strong><br \/>\nAn approved corporate IM solution is a valuable communications tool; unrestricted access to public services can present many risks, including IM spam, malicious links and data leakage.<br \/>\n<strong> 18. P2P<\/strong><br \/>\nPeer to peer software can be useful, but too often a user shares their entire hard drive, making all the company documents on it available to others.<br \/>\n<strong> 19. Online storage<\/strong><br \/>\nIf a user needs to store data with an online storage company, that data is now outside the company\u2019s control. You\u2019re not backing it up, searching and indexing it, and you cannot retrieve it if the employee leaves. Unless approved by the company, users should never be allowed to use cloud storage services.<br \/>\n<strong> 20. Webmail<\/strong><br \/>\nCompanies that use DLP solutions on their email system do so to make sure nothing is being emailed that presents a risk, like IP, NPI, or other sensitive data. Letting users access webmail provides them a way around this, and also risks them using personal email for corporate business.<\/p>\n<h2>Lost productivity<\/h2>\n<p><strong>21. Social Networking<\/strong><br \/>\nChecking their Facebook wall post may sound like a one-minute thing, but this might turn into hours per week as users tend to do other things once there such as commenting on\/following their friend\u2019s status updates, images, videos, andso on.<br \/>\n<strong> 22. Auctions<\/strong><br \/>\nSubmitting a bid might take only seconds at the start of an auction, but users can burn hours checking on a long term auction, or staying onto the close to make sure they aren\u2019t outbid.<br \/>\n<strong> 23. Gaming<\/strong><br \/>\nNo need for explanations here, an innocent five minute break to play an online game, might turn into long wasted hours.<br \/>\n<strong> 24. Gambling<\/strong><br \/>\nJust as in online gaming, but with the added concerns that this could lead to legal issues.<br \/>\n<strong> 25. Dating<\/strong><br \/>\nDating sites can become attention traps, leading a user to spend the entire day checking out their possibilities rather than focusing on their job.<br \/>\n<strong> 26. Software downloads<\/strong><br \/>\nAny software a user needs should come from IT, to ensure it is licensed, appropriate for the task, supportable, and doesn\u2019t crash their PC or LOB application.<br \/>\n<strong> 27. Daytrading and investment sites<\/strong><br \/>\nAnother site that seems harmless at first, until the user spends all morning waiting for the exact moment to buy or sell.<br \/>\n<strong> 28. Employment sites<\/strong><br \/>\nIf they want to hunt for another job, they really need to do that on their own time.<br \/>\n<strong> 29. Online shopping<\/strong><br \/>\nHere\u2019s one you may want to allow a limited amount of access to, especially during the holidays, but you don\u2019t want users to spend all day shopping when they should be working.<\/p>\n<h2>Copyright violations<\/h2>\n<p><strong> 30. Torrent sites<\/strong><br \/>\nBittorrent is a very useful protocol for distributing ISOs of open source operating systems, but too often it is used to distribute movies and music. This could go under bandwidth crushers, but the bigger risk is that your company gets sued by the MPAA or RIAA.<br \/>\n<strong> 31. Warez<\/strong><br \/>\nUnlicensed software can cost a company millions of dollars in fines. If a user needs an application to do their job, make sure that IT is buying it legitimately and licensing it appropriately. The BSA does take legal action.<\/p>\n<h2>Bandwidth crushers<\/h2>\n<p><strong> 32. Internet radio<\/strong><br \/>\nA single user streaming music may not use much bandwidth, but when the entire office is doing it, the total can quickly saturate a pipe.<br \/>\n<strong> 33. Sporting events<\/strong><br \/>\nI once worked for a company that only blocked one thing \u2013 the NCAA Final Four Basketball Tournament. Every year we had to scramble to block every possible way it could be viewed online because it not only killed productivity, it took out the campus DS3.<br \/>\n<strong> 34. TV and movie sites<\/strong><br \/>\nSome folks might be able to work with the TV on in the background; most can\u2019t really work well though, and the amount of aggregate bandwidth several simultaneous streaming movies can consume can quickly use up the entire circuit.<\/p>\n<h2>Policy violations<\/h2>\n<p><strong> 35. Anonymizers<\/strong><br \/>\nYou can argue that anonymizers are only there to protect users\u2019 privacy, but you cannot argue that there is a real reason why they need that while surfing at work. Whatever they are doing online, if they need to use an anonymizer service, it probably isn\u2019t work related.<br \/>\n<strong> 36. Open proxies<\/strong><br \/>\nHere\u2019s another case where the likelihood that whatever they are doing is work-related approaches zero. Open proxies really just help you hide your actions or access content that is not licensed for your actual country of origin. In either case, it\u2019s not work related activity.<br \/>\n<strong> 37. IM portals<\/strong><br \/>\nIf you are blocking instant messaging, the easiest way to get around that is for a user to hit the service\u2019s web portal or one of the many IM aggregation portals that exist. Blocking these helps ensure you are restricting IM access.<\/p>\n<p>You don\u2019t need to block 100% of all sites within all of these categories. A certain amount of recreational Internet access can go a long way towards improving employee morale, and if it doesn\u2019t cause a productivity issue, and all users obey the rules, there\u2019s no harm for most organizations. Look for web filtering software that can permit a certain amount of recreational use, either by total time or bandwidth used. \u201cNothing in excess\u201d is a good rule of thumb for those categories that don\u2019t present a risk of data loss or malware infection. While uncontrolled Internet access presents many risks, a good web filtering solution and appropriate policies can mitigate those while still letting users surf the web.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Top 37 Risks Admins Take with Uncontrolled Internet Usage Written by Emmanuel Carabott on October 10, 2011 \u2013 4:00 pmNo Comment No one in IT really wants to be the Internet Police \u2013 granted. In fact, the less we &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?p=836\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-836","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=836"}],"version-history":[{"count":1,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/836\/revisions"}],"predecessor-version":[{"id":837,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/836\/revisions\/837"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=836"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}