PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Organizations Need 'Security 3.3' to Protect Themselves and Their Employees, Says Security Expert

Network security guru Nigel Hawthorn, VP EMEA Marketing, Blue Coat Systems discusses how in the new social networking age, web threats challenge traditional security defenses by exploiting unsuspecting users and gives insights into Security 3.3

2011-01-06
DUBAI, UAE, January 06, 2011 (Press-News.org) In the battle against cybercrime, there is one indisputable fact: the bad guys are working harder, faster and smarter than the average web user. These organized criminal operations have an astonishing grasp of online human behavior and know how to use social engineering tactics and Web 2.0 technologies to lure users to malware. While users have become more aware of hoaxes and scams sent through email, they are still far too trusting of content sent from a "friend" or familiar organization on a social networking site. This new threat environment leverages Web 2.0 technologies and is far more advanced than today's users and the current defenses they are using, which means a whole new security approach is needed.

User 1.0 and Web 2.0 vs. Malware 3.2

Although email threats still exist, email is no longer the primary delivery vehicle for malware. There are two reasons for this: First, email security solutions have improved greatly. But more important, users have learned not to open suspicious attachments or click on URLs included in email from anonymous sources.

While the online community overall has become more aware of email scams, most people are still at the User 1.0 level when confronted with new web-based threats. For instance, many users still exercise poor security habits, such as assigning the same username and password to multiple online accounts. With the widespread adoption of Web 2.0 technologies, bad guys have a new way to bait users and distribute malware. In fact, these technologies have contributed to an acceleration of the threat lifecycle, allowing bad guys to quickly create, launch and evolve web threats to stay ahead of the defenses. If users are at version 1.0 and web technologies are at version 2.0 then, malware has advanced to version 3.2. And organizations need security 3.3 to protect themselves and their employees.

Social networking: A cybercriminal's dream

Social networking sites that leverage Web 2.0 technologies have become such popular targets for cybercrime for several reasons:

- It's where the users are. To be effective, cybercriminals go where they can find the most victims — and today, that means social networking sites. The number of Facebook users alone surpassed 500 million in 2010. And that number only continues to grow. In fact, today, more users have social networking accounts than webmail accounts.

- They can exploit trust. While the same user won't open an email from someone they don't know, they will "friend" people they don't know in real life and click on a URL sent from someone within their network. This blind trust is a golden opportunity for bad guys that just need to acquire login credentials to reach all "friends" of the victim. This trust is key to spreading malware through social networks.

- Social networking is no longer just social. It's now a common communication tool for businesses of all sizes. In fact, 70% of small and medium-sized businesses rely on Facebook, LinkedIn, YouTube and other social media for essential business services such as customer communication, training videos and content distribution. But in 2010, 30% of all small and medium-sized businesses were infected with malware spread through social networks — a strong indication that traditional firewall and desktop anti-virus protection is no longer adequate to block these threats.

Is there such a thing as safe social networking?

Yes. But you need more than the average security portfolio to achieve it. Safe social networking against the backdrop of the new threat environment requires an aggressive security strategy that goes beyond firewalls and desktop anti-virus. Here are a few key rules to keep in mind to take your security solution to version3.3 and stay ahead of the cybercriminals.

Three Requirements for Security 3.3

First: Proactive web filtering is critical.

The vast majority of today's attacks use the web to host malware. These schemes drive users to infected URLs through a variety of routes, including manipulated search engine results, spam and social networking recommendations or "likes." Comprehensive Web filtering provides a front line of defense to block links, scripts and other techniques that either trick users with fake offers ("Update Your Video Player" or "Your Computer Is At Risk") or automatically cause the computer to connect to a malware source, botnet or spyware "phone-home" site that collects stolen login credentials, user information and other sensitive data.

By identifying the URLs of "phone-home" sites, comprehensive web filtering also enables you to identify and clean compromised systems before the attack spreads. In other words, web filtering helps increase your visibility into the various sources of malware and phishing attacks and protect your network and users from those attacks.

Second: Move at the speed of malware.

Real-time threats require real-time security. But traditional security solutions, including desktop AV and firewalls, is simply no match for today's complex, fast-moving blended threats — some of which can change in as little as two hours. So if your security approach relies on users to download and install the latest security updates, you're already at risk of attack.

Cloud-connected communities have emerged as the most effective way to quickly identify and block malicious threats in real time. Communities draw on the intelligence of millions of worldwide users through real time URL requests, so as soon as one member encounters a threat, everyone in the community is notified and automatically protected from that threat. Instead of fighting billions of web threats alone, community members benefit from the safety in numbers and on-demand via the cloud security intelligence.

To keep pace with a rapidly evolving threat landscape, the defenses in cloud-connected communities can be seamlessly expanded to protect against the new and emerging threats. These defenses can be available to users without requiring manual downloads or updates, ensuring business have the latest protection at all times.

In addition to cloud security and web filtering, security best practices dictate the need for malware scanning at the web gateway. Large enterprises have used this strategy for a while, but these solutions have been price prohibitive for SMBs. The good news is that affordable, enterprise-class solutions are now coming on the market.

Third: Don't expect end users to be security experts.

End users, no matter how security conscious, are the number-one security risk in any organization, so don't leave the security of your business data up to them. While user education is important, you have to ensure your employees are protected, wherever they work, at any time. Social engineering tactics that entice people to download malware through the latest celebrity or disaster videos, cheap goods, online pharmaceuticals and more will continue to evolve as today's scams become less effective. Remember: malware will always try to be two giant steps ahead of your users. It's up to you to ensure a user's poor judgment doesn't put your business at risk.

Why is all this necessary?

As more businesses like yours adopt social networking for communication purposes, the lines between business and personal use will continue to blur. To ensure your business can benefit from Web 2.0 technologies without exposing them to the risk of malware 3.2, you need a security 3.3 strategy in place. A security approach that combines a cloud-based intelligence community with real-time web filtering and malware scanning at the gateway is critical to maximizing the business benefits of social networking while minimizing the security risks.

About Blue Coat Systems
Blue Coat Systems is the technology leader in Application Delivery Networking. Blue Coat offers an Application Delivery Network Infrastructure that provides the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. This application intelligence enables enterprises to tightly align network investments with business requirements, speed decision making and secure business applications for long-term competitive advantage. Blue Coat also offers service provider solutions for managed security and WAN optimization, as well as carrier-grade caching solutions to save on bandwidth and boost the end-user Web experience. For additional information, please visit http://www.bluecoat.com.

FORWARD LOOKING STATEMENTS: The statements contained in this press release that are not purely historical are forward-looking statements, including statements regarding Blue Coat Systems' expectations, beliefs, intentions or strategies regarding the future, and including statements regarding the capabilities and expected performance of Blue Coat Systems' products. All forward-looking statements included in this press release are based upon information available to Blue Coat Systems as of the date hereof, and Blue Coat Systems assumes no obligation to update any such forward-looking statements. Forward-looking statements involve risks and uncertainties, which could cause actual results to differ materially from those projected. These and other risks relating to Blue Coat Systems' business are set forth in the Securities and Exchange Commission reports filed by Blue Coat Systems, including but not limited to the risks described in the most recent reports on Form 10-K and Form 10-Q, particularly under the heading "Risk Factors."

Blue Coat, ProxySG and the Blue Coat logo are registered trademarks or trademarks of Blue Coat Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners.

For more information, please contact:

Manal Abi Rafeh
Regional Marketing Manager ME & Turkey
Blue Coat Systems ME
Telephone: +971 4 3911620
Fax: +971 4 3911635
Email: manal.abirafeh@bluecoat.com

Media Contact:
Colin Saldanha
PR Consultant
PROCRE8
Dubai - UAE
GSM: +971 (50) 6400762
Email: colin@procre8.biz


ELSE PRESS RELEASES FROM THIS DATE:

Will Payday Loans Help or Hinder the January Financial Blues?

2011-01-06
Much of the press criticises payday loans, whereas both customers who have availed of this facility as well as UK faxless payday loans ( http://www.cashchoiceuk.co.uk ) companies can recommend them, especially in a difficult month like January. UK payday loans lender, Cash Choice, states that depending on how they are used payday loans can in fact help families during a month like January, when cash flow is especially challenging. Cash Choice recommends only using payday loans as an emergency cash flow solution. Traditionally January can be a tough financial time ...

Leading Commercial Vehicle Vendor Anchor Vans Reports Huge Surge in Sales of 4x4 Vehicles as Cold Weather is Predicted to Continue

2011-01-06
Anchor Vans - one of the leading vendors of used vans in the UK reports a massive increase in sales of 4x4s as the cold weather is predicted to continue into the New Year. Whilst Anchor Vans sells all makes and models of new and used 4x4 vans, the Nissan Navara 4x4 is proving to be a bestseller. For more information call 0118 9710 230 or go to http://www.anchor4x4.co.uk. "The weather we've seen over the past fortnight is a bit of a mixed blessing," said Simon Joyce, Sales Director for Anchor Vans. "Whilst it's hugely inconvenient for the majority of our customers who ...

Custom Ladies Football Kits Online Designer Tool Released by Team Colours

2011-01-06
Team Colours, the UK custom sportswear manufacturer and designer, are delighted to offer this quality, affordable range of ladies football kits( http://www.team-colours.co.uk/football/ ). The range starts off for as little as GBP13.70 for a kit, with a variety of styles available from retro to plain styles such as Fortuna to originally designed football kits like the Classic Football Kits. Yet Team Colours are taking it one step further by offering their extremely easy to use online designer tool. This tool is a great help to tailor the most suitable bespoke women's ...

MERJS Announces Successful Let of SW1 Commercial Property Space to be Used as New Fitness Studio by Ten Pilates

2011-01-06
MERJS announces the successful let of a lower ground floor office space at 6 Duke Street, London SW1 to Ten Pilates, a successful fitness company. The lower ground floor comprises circa 2,418 sq ft (224 sq m), let with a full repairing and insuring lease for a term of twelve months. For further information visit http://www.merjs-agency.co.uk or call +44 20 7079 3976. "Ten Pilates is a fast growing business with studios currently in Notting Hill, Mayfair and Chiswick," said Colin Becker, Equity Director for MERJS. "They are close to securing further studios as long term ...

WPF Interactive Online Training at BigClasses

2011-01-06
* 100% JOB Oriented Training * Attend Two FREE Trail Classes * Affordable FEE with REAL TIME Trainers WPF course content: http://bigclasses.com/cms/microsoft-technologies/wpf.html BigClasses.com is a Global Interactive Online Learning Portal started by Microsoft Technologies Experts with an aim to provide a Job Oriented Training on Microsoft Technologies. ABOUT OUR FACULTY: We have excellent WPF instructors, who have Industry experience & experts in Online Training. TRAINING HIGHLIGHTS: 1. Interactive Learning at Learners convenience 2. Industry Savvy ...

UK Fleet Insurance Experts Criticise Increase in Fuel Duty

2011-01-06
Experts in the fleet insurance industry have criticised the increase in fuel duty which added another 0.76p on both petrol and diesel from 1st January 2011. This is the third fuel duty rise since April 2010 with an additional increase forecast again in April 2011. Fleet insurance ( http://www.cover4fleetinsurance.co.uk ) company Cover 4 Fleet Insurance has condemned the increase which will affect their customers and the performance of British business in general. A spokesperson said that currently the AA figures reveal that on 31st December 2010, a litre of diesel ...

Creotology is Offering a Report to Turn Regular People into Mental Blackbelts

2011-01-06
Creotology Personal Development is a mental Black Belt Training for real life advancement. Creotology teaches you how to control your emotions in all situations. After all it is your emotions that control how you react to a situation and to your feelings about the situation. Creotology Program Helps to Delve into the truth of personal development. With application of Western psychology, Eastern philosophy, and a plethora of mental and spiritual exercises ranging from the extremely obscure to the well known.Allows yourself to work on the premises of being efficient and ...

Aerielle Demonstrates Latest Products in Their Consumer Series at CES 2011

2011-01-06
Aerielle Technologies, Inc., a leading edge provider in wireless audio technology, demonstrates the latest additions to its line of consumer products at the 2011 Consumer Electronics Show (CES) in Central Hall Booth# 15116. The StreamBase and the new and sleeker redesigned Stream XR are embedded with the award winning Stream technology that allows you to experience rich and vivid audio wirelessly. Both new products are transceivers that broadcast and receive better than CD-quality audio without sacrificing sound quality. With an extended wireless range of 75+ feet for ...

AsiaRooms.com - Bali International Spa and Wellness Expo to be Held Near Seminyak

2011-01-06
The next edition of the Bali International Spa and Wellness Expo series is due to take place midway through next month. An event dedicated to the commercial viability of the sector and the end products it offers, it will run between February 11th and 13th 2011 at the Bali International Convention Center in Nusa Dua. Some 250 companies are expected to exhibit their wares to trade visitors at the conference, with firms set to travel from all over the world to get involved. As well as representation from south-east Asian nations such as Singapore, Malaysian and Thailand, ...

Distinguished Panel to Discuss 2011 Long Island Economic Initiatives at the HIA-LI Annual Luncheon and State of Long Island Meeting

Distinguished Panel to Discuss 2011 Long Island Economic Initiatives at the HIA-LI Annual Luncheon and State of Long Island Meeting
2011-01-06
HIA-LI, the recognized voice for business on Long Island, will host a panel of distinguished state and local elected officials to discuss the state of the Long Island business economy during the organization's Business Luncheon and Annual Meeting on Tuesday, January 11, 2011, from 11:30 AM - 2:00 PM at the Melville Marriott. Tickets are available at http://www.hia-li.org or by calling 631-543-5355. "In the current economic environment, Long Island business owners are very interested to hear from experts about the business impact of decisions from Albany and Washington," ...

LAST 30 PRESS RELEASES:

Time alone heightens ‘threat alert’ in teenagers – even when connecting on social media

Study challenges long-held theories on how migratory birds navigate 

Unlocking the secrets of ketosis

AI analysis of PET/CT images can predict side effects of immunotherapy in lung cancer

Making an impact. Research studies a new side of helmet safety: faceguard failures

Specific long term condition combinations have major role in NHS ‘winter pressures’

Men often struggle with transition to fatherhood amid lack of targeted information and support

More green space linked to fewer preventable deaths in most deprived areas of UK

Immunotherapy drug pembrolizumab improves outcomes for patients with soft tissue sarcoma

A formula for life? New model calculates chances of intelligent beings in our Universe and beyond

Could a genetic flaw be the key to stopping people craving sugary treats?

Experts urge complex systems approach to assess A.I. risks

Fossil fuel CO2 emissions increase again in 2024

Winners of Applied Microbiology International Horizon Awards 2024 announced

A toolkit for unraveling the links between intimate partner violence, trauma and substance misuse

Can everyday physical activity improve cognitive health in middle age?

Updated guidance reaffirms CPR with breaths essential for cardiac arrest following drowning

Study reveals medical boards rarely discipline physician misinformation

New treatment helps children with rare spinal condition regain ability to walk

'Grow Your Own' teacher prep pipeline at the University of Louisiana at Lafayette funded by US Department of Education

Lab-grown human immune system uncovers weakened response in cancer patients

More than 5 million Americans would be eligible for psychedelic therapy, study finds

Children’s Hospital of Philadelphia researchers find community health workers play critical role in coordinating asthma care across home, school and community

Comprehensive Genomic Profiling leads to better patient outcomes, new joint study says  

Animated movie characters with strabismus are more likely to be villains, study finds

How retailers change ordering strategy when a supplier starts its own direct channel

Young coral use metabolic tricks to resist bleaching

Protecting tax whistleblowers pays off

Bioluminescent proteins made from scratch enable non-invasive, multi-functional biological imaging

New study links air pollution with higher rates of head and neck cancer

[Press-News.org] Organizations Need 'Security 3.3' to Protect Themselves and Their Employees, Says Security Expert
Network security guru Nigel Hawthorn, VP EMEA Marketing, Blue Coat Systems discusses how in the new social networking age, web threats challenge traditional security defenses by exploiting unsuspecting users and gives insights into Security 3.3