Logo
    Search

    Why web browsers are key to cyber security | Sponsored

    enOctober 18, 2023

    Podcast Summary

    • Browsing with outdated or unsafe web browsers can lead to data breaches and cyberattacksKeep software up to date and be cautious to protect against potential identity theft, financial loss, and reputational damage from malicious third parties through unsafe browsers and malware.

      Using outdated or unsafe web browsers can put individuals and organizations at risk of data breaches and cyberattacks. With the increasing shift to remote work and online transactions, more sensitive information is being transferred through web browsers than ever before. This data includes personal information, financial transactions, and customer data. If a browser is compromised, malicious third parties can gain access to this information, leading to potential identity theft, financial loss, and reputational damage. Unsafe browsers also pose risks through malware such as trojans, viruses, and ransomware. The UK's National Cybersecurity Centre and international counterparts have warned organizations about the importance of updating their systems to protect against these threats. Therefore, it's crucial for individuals and businesses to prioritize browser security by keeping software up to date and being cautious of downloading extensions or visiting suspicious websites.

    • Stick to trusted browsers and keep them updatedUsing outdated or unknown browsers can put your data and system at risk. Use the browser that comes pre-installed on your device and keep it updated for optimal safety.

      Using an outdated browser or installing unknown browsers can put your information and system at risk. Malicious websites can trick you into handing over your data or downloading malware. Stick to browsers that come pre-installed on your device from trusted vendors, and ensure they are kept up to date with automatic updates. These browsers have been verified by the operating system vendor and are less likely to pose a threat. If you're more tech-savvy and prefer to use a different browser, download it from a trusted app store where it has been verified before publication. In general, using the browser that comes pre-installed on your device and keeping it updated is the safest choice.

    • Browser Security: A Crucial Aspect of Web Safety for CompaniesGoogle Chrome prioritizes browser security due to its large user base and employs a zero-trust model to limit access and mitigate risks, but still faces threats from social engineering, phishing, malware, and data mishandling.

      Browser security is a crucial aspect of overall web safety, especially for companies with large user bases. Companies may need to distribute specific browsers to their users and keep them updated to ensure compatibility and security. Google, with its massive user base of over 2 billion for Google Chrome, prioritizes browser security due to the significant economic impact of cyberattacks and the increasing targeting of browsers by attackers. Chrome employs a least privileged approach to security, known as a zero-trust model, to limit access to resources and mitigate risks. However, even with a bug-free browser, there are still threats from social engineering, phishing, malware, and mishandling of corporate data. Chrome addresses these threats through features like safe browsing, extension security, policy controls, and data loss prevention. Browser security is an often overlooked yet essential topic in cybersecurity discussions.

    • Securing web browsers is a team effortWeb developers build secure sites, browser providers standardize security, orgs apply controls & educate employees, focusing on passwords, phishing, and extension management

      Securing web browsers is a collaborative effort between web developers, browser providers, and enterprise organizations. Each party plays a crucial role in enhancing cybersecurity. Web developers must build websites securely, browser providers need to standardize secure practices and defend against vulnerabilities, and enterprise organizations must apply controls and educate employees. Common pitfalls for organizations include password mismanagement, lack of password managers, and insufficient extension management. Password reuse and weak encryption standards pose significant risks, making unphishable modes of authentication like security keys essential. Furthermore, employees should be trained to identify phishing attempts and avoid installing unverified extensions. By focusing on these areas, organizations can create a secure environment for their employees to use the web effectively and safely. This is especially important given the high volume of time spent on websites and web-based software, the potential for human error, and the ever-evolving threat landscape.

    • Double-check URLs for online securityUsers should verify URLs and heed browser warnings to avoid phishing sites and protect sensitive information.

      While it's the responsibility of browser vendors, web developers, and IT admins to ensure online security, end users also play a crucial role. Users should double-check the URL in the address bar before entering sensitive information to avoid phishing sites. Browsers offer warnings for unencrypted sites or potential threats, and users should heed these warnings unless they have a strong technical understanding. Organizations can introduce additional security measures, such as controlling encryption levels and warnings, through enterprise policies. Policies and regulations also play a role by informing users of acceptable online behavior. Overall, a collaborative effort between all parties involved is necessary to maintain online security.

    • Staying Safe Online: Tools and Policies for Individuals and OrganizationsUse tools like Google Safe Browsing and Privacy Badger, comply with rules like ISO 27001 and GDPR, and consider an enterprise browser to ensure a safer and more secure browsing experience for individuals and organizations.

      Using a secure browser and adhering to relevant policies and procedures are crucial for both individuals and organizations when navigating the Internet. We discussed how sites like Google Safe Browsing and the Electronic Frontier Foundation's Privacy Badger can help users browse safely and avoid potential threats. Additionally, companies and organizations must comply with various rules such as ISO 27,001 and GDPR to protect sensitive data and inform users about their online privacy. By implementing these measures, we can all ensure a safer and more secure browsing experience. Thanks to our guests Emily and Matt for sharing their insights on this topic during our New Statesman Spotlight podcast in partnership with Google Chrome Enterprise. To learn more about how an enterprise browser can protect your company data and improve cybersecurity, visit the Chrome Enterprise website. Don't forget to check out more policy reporting from Spotlight in our podcast feed or on our website, linked in the show notes. I'm Becky Slack, and our producer is Chris Stone. Thanks for listening.

    Recent Episodes from The New Statesman Podcast

    The race to cervical cancer elimination | Sponsored

    The race to cervical cancer elimination | Sponsored

    Cervical cancer is the fourth most common cancer in women globally. It causes more than 800 deaths in the UK each year.

     

    Yet 99.8% of cervical cancer cases are entirely preventable. Regular screening and the introduction of the Human Papillomavirus (HPV) vaccination are helping to reduce the number of deaths. With smart policy and public health interventions NHS England have set 2040 as the target date for total elimination of cervical cancer.

     

    If that goal is to be met the issue of health inequality needs to be addressed; currently screening and vaccination rates vary between different regions, communities and socio-economic groups.

     

    So what needs to be done to share best practice and narrow these inequalities?

     

    In this episode of Spotlight on Policy, host Zoe Grunwald is joined by Emma Cerrone, Business Unit Director for Public Health & Vaccines at MSD; Dr Adeola Olaitan, Honorary Associate Professor at University College London and Honorary Consultant Gynaecological Oncologist at UCLH; and Gayathri Kumar, Senior Economist at OHE, the Office for Health Economics.

     

    This episode has been fully funded by MSD who, as sponsors, have reviewed and inputted to the final content. The report referenced by Office for Health Economics throughout this episode was fully funded by MSD. Ultimate editorial control for this episode and the OHE report rests solely with the New Statesman and the Office for Health Economics, respectively. MSD is one of the world’s leading pharmaceutical companies active in several key areas of global health, including immunisation and oncology.



    Hosted on Acast. See acast.com/privacy for more information.

    What's happening in Northern Ireland? and should polling be banned?

    What's happening in Northern Ireland? and should polling be banned?

    It's listener question time! Freddie Hayward, political correspondent, is joined by Finn McRedmond, junior commissioning editor and writer, to answer questions on Northern Ireland, personal approval ratings, presidential debates, and polling influence.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    On the road with Corbyn, Farage, and Lammy

    On the road with Corbyn, Farage, and Lammy

    Today New Statesman is publishing an election special issue of the magazine which includes our election endorsement as well as in-depth political interviews with Jeremy Corbyn, Nigel Farage, and David Lammy.


    Rachel Cunliffe, associate political editor, is joined in the studio by George Eaton, senior editor, and editor-in-chief Jason Cowley.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    Up all night to Bet Lucky

    Up all night to Bet Lucky

    Another day, another flurry of betting allegations. More and more parties are now being dragged into the gambling scandal, but should we discern some distinction between the nature of these bets and their repercussions?


    Hannah Barnes, associate editor, is joined by Freddie Hayward, political correspondent, and Ben Walker, senior data journalist.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    Andrew Marr: "If I were Sunak, I'd be wailing under the table"

    Andrew Marr: "If I were Sunak, I'd be wailing under the table"

    Everything's been going so badly for the prime minister, one can't help but admire the fact that he's carrying on.


    Hannah Barnes, associate editor, is joined by Andrew Marr, political editor, to discuss the developments in the betting scandal, how Nigel Reform lost the right, and why Labour failed to win over the Murdoch empire.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    Is GamblingGate the new PartyGate?

    Is GamblingGate the new PartyGate?

    We’re in the penultimate week of campaigning, which may come as a relief to those suffering from election fatigue - maybe no one more so than Rishi Sunak. The prime minister has not had a particularly smooth weekend as the Tory betting scandal continues to rumble on …


    Hannah Barnes, associate editor, is joined by George Eaton, senior editor, to discuss the latest developments in the gambling scandal, Labour's positions gender recognition and their plans for the House of Lords.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    Rishi Sunak is campaigning through gritted teeth

    Rishi Sunak is campaigning through gritted teeth

    We were bestowed yet another leadership TV special last night, Ed Davey said sorry for tuition fees, Rishi Sunak said sorry for Liz Truss, and Keir Starmer said sorry for Jeremy Corbyn. But one unmissable feature of the night was the grimace on the prime ministers face as the impassioned audience put their questions to him.


    Rachel Cunliffe, associate political editor, is joined by Freddie Hayward, political correspondent to discuss the TV special and to answer listener questions.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us




    Hosted on Acast. See acast.com/privacy for more information.


    Stop The Bets!

    Stop The Bets!

    The Tory gambling scandal respawned last night when it was revealed that a met officer working in Rishi Sunak's protection team had been arrested over alleged bets, and also being looked into by the Gambling Commission is Laura Saunders - a Conservative candidate who happens to be married to the director of campaigns in CCHQ.


    The team also discuss the three polls published last night; while the predictions may differ, all roads lead to disaster for the Conservatives.


    Hannah Barnes, associate editor, is joined by Rachel Cunliffe, associate political editor, and Freddie Hayward, political correspondent.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us




    Hosted on Acast. See acast.com/privacy for more information.


    Is there still momentum for Scottish independence?

    Is there still momentum for Scottish independence?

    "Vote SNP for Scotland to become an independent country" - bold letters shout from the first page of the SNP manifesto. But is there still momentum for independence in Scotland? And what else is John Swinney pledging in his fight to retain seats from the hands of Scottish Labour.


    Hannah Barnes, associate editor, is joined by Chris Deerin, Scotland editor, and Ben Walker, senior data journalist.


    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.


    Andrew Marr: Labour must prepare for the turning tide

    Andrew Marr: Labour must prepare for the turning tide

    Labour are set to win a majority, if not a supermajority, but in these politically fragmented times will people who vote for the party necessarily stay loyal in their support after July the fifth?

     

    Hannah Barnes, associate editor, is joined by political editor Andrew Marr to discuss the changing political tides, Starmer's continued struggle with tax and Corbyn, and the potential return of Boris Johnson.

     

    Register to vote: https://www.gov.uk/register-to-vote

     

    Sign up to the New Statesman's daily politics newsletter: Morning Call

     

    Submit a question for a future episode: You Ask Us



    Hosted on Acast. See acast.com/privacy for more information.

    Related Episodes

    What You Need to Know about Cybersecurity

    What You Need to Know about Cybersecurity

    Today's special episode features audio from a webinar that we had earlier this year. In the audio you will hear from Jordan and our special guest, CEO of Mapletronics, Wes Hershberger. We and Jordan discuss current cybersecurity threats and how you can begin to protect yourself and your business. 

    Discussion includes: email safety, phishing protection, educating employees, strong password policies, data encryption, geofencing, online shopping safety, and more. 

    January 14, 2020 - SWN #3

    January 14, 2020 - SWN #3

    This week on Security Weekly News, Dr. Doug White covers the following stories: Tesla Goes Pwn2Own Again This Year, GRU "hacks" a Ukranian Gas Company at the Heart of Scandals in DC, Is Iran Shutting Down Social Media to Prevent Protests?, The US Government Issues Phones to the Poor Which Contain Chinese Malware. Oh, and the phones were Chinese too, Cloudflare Expands Into VPN and Firewalling, Microsoft has Officially Ended Support for Win 7 and Server 2008, A Nasty Bug in Firefox, Citrix Exploits are Being Well... Exploited, Can We Just Go Ahead and Read the Patterns in Encryption?, Cisco Data Center Vulnerabilities, More Lawsuits in Georgia, The Return of Emotet, Never Give the Victim a Break if You Want Them to Pay, and Is the US Better Than Anyone in the World at Cyber? In the expert commentary segment, Jason Wood covers the State of 5G Security.

    Visit https://www.securityweekly.com/swn for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/SWNEpisode3

    2019-020-email_security_controls-windows_scheduler

    2019-020-email_security_controls-windows_scheduler

    Bryan got phished (almost) - story time!

     

    https://isc.sans.edu/forums/diary/Do+you+block+new+domain+names/17564/

     

    Through OpenDNS

    https://learn-umbrella.cisco.com/product-videos/newly-seen-domains-in-cisco-umbrella

    Available January 2017, Umbrella filters newly seen or created domains. By using new domains to host malware and other threats, attackers can outsmart security systems that rely on reputation scores or possibly outdated block lists. Umbrella now stops these domains before they even load.

     

    Also “unknown” category? pros/cons

     

    Good filter time for domains?

     

    Amanda: windows logging issues

    well…. FUCKING EVERYTHING CREATES TASKS IN SCHEDULER

     

    https://www.microsoft.com/en-us/windowsforbusiness/windows-atp

     

    Breach news:

     

    https://www.dutchnews.nl/news/2019/05/hackers-steal-key-info-about-home-hunters-from-housing-agency/

    FTA: The hackers now have their name, address, contact information and copies of their passport or ID card, which includes their personal identification number, or BSN.

    This is sufficient to allow the hackers to open bank accounts or take out loans by using other people’s identity.

     

    https://www.bleepingcomputer.com/news/security/over-757k-fraudulently-obtained-ipv4-addresses-revoked-by-arin/

    Mostly colos, data centers, ‘aaS’ providers

    Many in the Mid-West

     

    Book Club

    Cult of the dead cow - June

    Tribe of Hackers - July

    The Mastermind - August

    The Cuckoo’s Egg - September

     

    https://www.infoseccampout.com

    EventBrite Link:https://www.eventbrite.com/e/infosec-campout-tickets-61915087694

    Check out our Store on Teepub! https://brakesec.com/store

    Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com

    #Brakesec Store!:https://www.teepublic.com/user/bdspodcast

    #Spotifyhttps://brakesec.com/spotifyBDS

    #RSShttps://brakesec.com/BrakesecRSS

    #Youtube Channel:  http://www.youtube.com/c/BDSPodcast

    #iTunes Store Link: https://brakesec.com/BDSiTunes

    #Google Play Store: https://brakesec.com/BDS-GooglePlay

    Our main site:  https://brakesec.com/bdswebsite

    #iHeartRadio App:  https://brakesec.com/iHeartBrakesec

    #SoundCloudhttps://brakesec.com/SoundcloudBrakesec

    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security Podcast by using our #Paypalhttps://brakesec.com/PaypalBDS OR our #Patreon

    https://brakesec.com/BDSPatreon

    #Twitter@brakesec @boettcherpwned @bryanbrake @infosystir

    #Player.FM : https://brakesec.com/BDS-PlayerFM

    #Stitcher Network: https://brakesec.com/BrakeSecStitcher

    #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

    Audio Security - PSW #620

    Audio Security - PSW #620

    Wes Widner is the Cloud Engineering Manager at CrowdStrike. Wes will be talking about personal voice assistants are the wave of the future. So naturally we should wonder about the unique attack vectors they pose. I'd like to discuss my research into this field and share a few tips on how you can keep yourself safe around voice assistants. Full Show Notes: https://wiki.securityweekly.com/Episode620

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    The CyberPHIx Roundup: Industry News & Trends, 6/7/21

    The CyberPHIx Roundup: Industry News & Trends, 6/7/21

    The CyberPHIx Roundup is your quick source for keeping up with the latest in cybersecurity news, trends and industry leading practices, specifically for the healthcare industry.

    In this episode, our host Brian Selfridge highlights the following topics trending in healthcare cybersecurity this week:

    • Major shifts in cyber liability coverages and protections and results from a recently released U.S. Government Office of Accountability (GAO) report
    • Scripps Health system network outage continues a month after initial cyberattack
    • Russian SolarWinds attackers are back at it with a large spear phishing campaign following a compromise of USAID systems
    • Security firm Rapid7 becomes a victim of a software supply chain breach targeting source code
    • OCR’s latest settlement details and analysis on the resolution agreement with Peachstate Health Management
    • OCR and HHS “wall of shame” aggregate reporting trends for 2021 and analysis of major reported breaches this past month
    • U.S. House Committee on Homeland Security advances five new bills to improve cyber defenses