{"id":2037649,"date":"2024-11-27T03:03:19","date_gmt":"2024-11-27T08:03:19","guid":{"rendered":"https:\/\/securityboulevard.com\/?p=2037649"},"modified":"2024-11-27T03:03:19","modified_gmt":"2024-11-27T08:03:19","slug":"protecting-web-based-work-connecting-people-web-browsers-and-security","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/","title":{"rendered":"Protecting Web-Based Work: Connecting People, Web Browsers and Security"},"content":{"rendered":"<p>The web browser has transformed significantly in recent years, becoming one of the most used tools for work today. However, as organizations adopt hybrid work models and cloud-based operations, securing this work tool has proved a challenge. Security infrastructures haven&#8217;t evolved as fast as the browser, making them prone to cyberattacks. With browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions. Understanding the risks and implementing robust security measures is crucial for safeguarding the work we do today.<\/p>\n<h3>A Critical Juncture for Web Application Usage<\/h3>\n<p>Even though <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/the-state-of-security-in-the-modern-organization\" target=\"_blank\" rel=\"noopener\">approximately 85-100%<\/a> of the average work day occurs within web browsers, many enterprises lack the security necessary to address the threats that can originate there. <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/the-state-of-security-in-the-modern-organization\" target=\"_blank\" rel=\"noopener\">A recent survey<\/a> by Palo Alto Networks found that 95% of respondents experienced browser-based attacks in the last year, including account takeovers and malicious extensions. This issue is particularly concerning given that businesses currently use an average of around 370 web and SaaS applications, with a <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/the-state-of-security-in-the-modern-organization\" target=\"_blank\" rel=\"noopener\">50% increase<\/a> in application usage expected over the next two years. Can you guess how these work applications are accessed? Vulnerable, consumer-grade web browsers.<\/p>\n<p>The repercussions of this influx of vulnerable browsers and applications in the enterprise are staggering, including financial losses and reputational damage. For example, account takeovers can lead to unauthorized access to sensitive information, enabling attackers to steal data from both the organization and its customers. Malicious browser extensions can introduce malware, extract data, or create backdoors for future attacks. Data breaches may lead to regulatory fines, a decline in customer trust and substantial expenses related to remediation and recovery.<\/p>\n<p>As these threats become more advanced, the potential harm to businesses increases, necessitating more sophisticated and comprehensive security measures. To properly address these types of threats, it\u2019s crucial to take a proactive approach, ensuring potential issues are addressed before a network is compromised.<\/p>\n<h3>Challenges That Come With Personal Devices<\/h3>\n<p>The transition to a hybrid work model has resulted in the extensive use of personal devices to access corporate applications. Almost 90% of organizations allow employees to access corporate applications and data from their devices without actively considering the implications. These personal devices often lack the rigorous security controls found on corporate devices, making them attractive targets for cyberattacks. Over<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">\u00a080%<\/a> of successful ransomware attacks come from these unmanaged devices.<\/p>\n<p>Traditionally, the answer was to force virtual desktop infrastructure (VDI) deployments to these workers \u2013 or to remove the problem altogether by shipping corporate, managed laptops to each employee and contractor globally. Both solutions can be expensive and difficult for even small organizations to manage \u2013 let alone the largest. Managed laptops in particular, often create long onboarding time, as well as offboarding difficulties when the organization needs to retrieve the laptop. Both solutions compromise the user experience and leave organizations at risk, as they don\u2019t support least-privileged access.<\/p>\n<p>A more effective solution to address unmanaged devices involves implementing a secure access service edge (SASE) framework. This enhances security by ensuring secure remote access to sensitive data and applications, protecting the organization\u2019s network from unauthorized access. To tackle security issues with web-based work directly, a SASE-native enterprise browser enables real-time detection and prevention of threats. This also extends SASE security to unmanaged devices. Advanced threat intelligence and machine learning algorithms detect anomalies, phishing attempts, malicious file uploads and downloads and data leakage.<\/p>\n<h3>Phishing Attacks and Organizational Vulnerability<\/h3>\n<p>Phishing remains a pervasive threat to today\u2019s workforce, with incidents affecting <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/network-email-gateways\/\" target=\"_blank\" rel=\"noopener\">94% of organizations<\/a> over the last year, despite many existing anti-phishing solutions. Improving defenses against these threats is essential for protecting sensitive data and ensuring organizational resilience.<\/p>\n<p>Organizations require tools to prevent access to malicious domains, unsafe URLs and phishing websites. Malicious websites should be identified and blocked or opened in read-only mode to ensure employees do not fall prey. And since every phishing attack involves the browser as the location with the risk of accessing the malicious page, opting for an enterprise browser with the capability to natively interact with users and warn them of potential phishing offers another effective solution. In addition, tools that enable IT visibility into employee use of unapproved websites, unsanctioned software, or personal apps are also essential in protecting against risks.<\/p>\n<h3>Looking at the Bigger Picture<\/h3>\n<p>Together, ongoing cybersecurity training for all employees in conjunction with robust security measures, like SASE, create a comprehensive defense strategy that not only safeguards company assets but also cultivates a vigilant and informed workforce. By emphasizing that &#8220;everyone can do their part&#8221; in maintaining cybersecurity, organizations empower their staff to take an active role in protecting sensitive information and contributing to a more resilient security posture. This collaboration enhances individual awareness and strengthens the organization\u2019s overall defense against cyberthreats.<\/p>\n<p>A <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" target=\"_blank\" rel=\"noopener\">zero-trust architecture<\/a> is crucial in today\u2019s cybersecurity landscape. This approach assumes no inherent trust in users or devices, and it requires always verifying the user is who they say they are and that their device posture is compliant based on the organizational requirements and their location. This is especially critical for organizations working with third parties or in industries with high churn rates where the risk of compromised credentials and devices is heightened. By using a SASE-native enterprise browser, granular zero-trust policies can be compiled directly <a href=\"https:\/\/securityboulevard.com\/2024\/09\/project-phantom-revolutionary-zero-trust-virtual-stealth-browser-url-analysis-thats-changing-the-game-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">within the browser<\/a>. This allows organizations to enforce strict access policies tailored to individual user roles and behaviors, such as device status, location and even policy attributes uniquely to SaaS web apps, like the logged-in user in particular SaaS applications. This enhances security by minimizing exposure to threats, ensuring that sensitive data and resources are only accessible to authorized individuals, significantly reducing the risk of breaches and fostering a more resilient security posture.<\/p>\n<h3>A Collective Effort<\/h3>\n<p>As organizations increasingly rely on web browsers and SaaS applications, robust cybersecurity measures are more critical than ever. The prevalence of browser-based attacks and vulnerabilities from personal devices in hybrid work environments require comprehensive strategies to protect sensitive information and maintain operational integrity. Implementing advanced solutions like a SASE-native enterprise browser that extends zero-trust to the browser, along with ongoing cybersecurity training that empowers employees to recognize potential risks, creates a proactive defense against evolving threats. Ultimately, these strategies safeguard company assets and build resilience against the ever-changing landscape of cyberthreats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions.<\/p>\n","protected":false},"author":22129,"featured_media":1818393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[230,23406,14097,98631,99462,99461],"tags":[13403,10020,66706,13655],"class_list":["post-2037649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security","category-blogs","category-sb","category-social-facebook","category-social-linkedin","category-social-x","tag-cloud","tag-cyber-attacks","tag-sase","tag-web-browsers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Web-Based Work: Connecting People, Web Browsers and Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"With web browsers being the primary gateway to the internet, any security lapse can lead to opportunities for significant data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Web-Based Work: Connecting People, Web Browsers and Security\" \/>\n<meta property=\"og:description\" content=\"With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-27T08:03:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anupam Upadyaya\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\",\"name\":\"Protecting Web-Based Work: Connecting People, Web Browsers and Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg\",\"datePublished\":\"2024-11-27T08:03:19+00:00\",\"dateModified\":\"2024-11-27T08:03:19+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/5a9271fed36973dd022847206a0947d2\"},\"description\":\"With web browsers being the primary gateway to the internet, any security lapse can lead to opportunities for significant data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg\",\"width\":760,\"height\":330,\"caption\":\"web browser, web, Menlo Security web domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/securityboulevard.com\/category\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting Web-Based Work: Connecting People, Web Browsers and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/5a9271fed36973dd022847206a0947d2\",\"name\":\"Anupam Upadyaya\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/cropped-Anupam20Head20Shot-96x96.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/cropped-Anupam20Head20Shot-96x96.jpg\",\"caption\":\"Anupam Upadyaya\"},\"description\":\"Anupam Upadhyaya is the vice president of product management for all SASE platforms at Palo Alto Networks, including Prisma Access, SD-WAN, GlobalProtect and ADEM at Palo Alto Networks. He has over 20 years of experience in networking and security. Prior to Palo Alto Networks, Anupam held senior product management roles at Cisco Systems, Aerohive Networks and Aruba Networks. He holds a master\u2019s degree in marketing and finance from Santa Clara University, and a bachelor\u2019s degree in computer science from IIT BHU.\",\"url\":\"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Web-Based Work: Connecting People, Web Browsers and Security - Security Boulevard","description":"With web browsers being the primary gateway to the internet, any security lapse can lead to opportunities for significant data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Web-Based Work: Connecting People, Web Browsers and Security","og_description":"With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions.","og_url":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-11-27T08:03:19+00:00","og_image":[{"width":760,"height":330,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg","type":"image\/jpeg"}],"author":"Anupam Upadyaya","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/","url":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/","name":"Protecting Web-Based Work: Connecting People, Web Browsers and Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg","datePublished":"2024-11-27T08:03:19+00:00","dateModified":"2024-11-27T08:03:19+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/5a9271fed36973dd022847206a0947d2"},"description":"With web browsers being the primary gateway to the internet, any security lapse can lead to opportunities for significant data breaches.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg","width":760,"height":330,"caption":"web browser, web, Menlo Security web domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/securityboulevard.com\/category\/blogs\/"},{"@type":"ListItem","position":3,"name":"Protecting Web-Based Work: Connecting People, Web Browsers and Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/5a9271fed36973dd022847206a0947d2","name":"Anupam Upadyaya","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/cropped-Anupam20Head20Shot-96x96.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/cropped-Anupam20Head20Shot-96x96.jpg","caption":"Anupam Upadyaya"},"description":"Anupam Upadhyaya is the vice president of product management for all SASE platforms at Palo Alto Networks, including Prisma Access, SD-WAN, GlobalProtect and ADEM at Palo Alto Networks. He has over 20 years of experience in networking and security. Prior to Palo Alto Networks, Anupam held senior product management roles at Cisco Systems, Aerohive Networks and Aruba Networks. He holds a master\u2019s degree in marketing and finance from Santa Clara University, and a bachelor\u2019s degree in computer science from IIT BHU.","url":"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108.jpg","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8y5j","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/22129"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2037649"}],"version-history":[{"count":1,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037649\/revisions"}],"predecessor-version":[{"id":2037650,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037649\/revisions\/2037650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1818393"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2037649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2037649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2037649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}