Businesses can leave themselves vulnerable to data theft and other online threats, particularly as security and IT budgets are under pressure while companies try to save money. Although budgets are tight, it is crucial for companies to stay protected online. On average, the total cost of security breaches, including lost business, in the UK last year was $2,565,702.

Data theft and other online threats represent significant dangers for businesses in the UK. The economic downturn exacerbates this problem, leading many executives to cancel, defer, or downsize security budgets.

To highlight the risks facing companies today, Astaro has compiled the following list of the five most serious internet security threats.

1. Browser Vulnerabilities

No browser provider is immune to security holes. A recent example is the CSS bug that affected Internet Explorer versions 6, 7, and 8 (CVE-2010-3962). This bug targets computers in a two-stage attack: first, the user follows an email link to a webpage containing malicious code. This code runs without the user realizing it and automatically installs a trojan on the computer. Simply visiting the website is enough to trigger the attack. To protect themselves, companies should avoid using browsers with known security holes until they are patched.

2. Vulnerabilities in Adobe PDF Reader, Flash, Java

The widespread use of Adobe PDF Reader, Flash, and Java makes them highly vulnerable to attack. Although providers frequently release patches for security holes, companies must ensure these patches are installed on all computers. Often, IT departments may be unaware of the patches, unable to install them, or encounter update failures. Malicious code embedded in Flash videos can run automatically, infiltrating the computer unnoticed and making it part of a botnet. Companies should avoid using these programs and employ policies prohibiting their use. To prevent attacks via Flash, companies can use Flash blockers (a browser plug-in) to stop videos from playing automatically.

3. Vulnerabilities in Web 2.0 Applications

New methods of attack, such as Cross-Site Scripting (XSS) or SQL Injection, pose significant threats. These vulnerabilities often arise from incorrect implementation of AJAX, a method for exchanging data asynchronously between server and browser. For example, the MySpace worm created by the hacker known as Samy allowed swift access to millions of MySpace profiles. More recently, the "on mouse over" attack on Twitter embedded malicious code in just 140 characters. Users can protect themselves by stopping the use of services with known security problems. Manufacturers must ensure their applications are secure or protect user data with a Web Application Firewall.

4. Cell Phone and Smartphone Data Security Holes

In the UK, there are more mobile phones than people, leading to daily discoveries of new data security risks. A new generation of worms targets smartphones, such as the ZeuS botnet which used infected HTML forms to obtain cell numbers and send malware via text messages. This malware intercepted and diverted banking transactions. Many Apple users perform jailbreaking to remove usage limitations, making their devices more vulnerable to attack. Users often do not change the default SSH password, leaving devices susceptible to unauthorized access.

5. Zero-Day Exploits in Operating Systems

Zero-day attacks exploit vulnerabilities unknown to others for which no patch exists. The manufacturer becomes aware of the vulnerability only on the day of the attack or later. This allows hackers to exploit these holes, giving them direct remote access to affected systems. There is no way to protect against zero-day exploits until patches are released. Both Microsoft and Mac systems are targets for these attacks.


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.