Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 5 Major problems with employees using your browser
Global Security

5 Major problems with employees using your browser

AdminBy AdminApril 22, 2025No Comments7 Mins Read
5 Major Concerns With Employees Using The Browser
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


5 Major problems with employees using your browser

As Saas and cloud work rework the enterprise, the web browser has become a new final point. However, unlike the final points, the browsers remain mostly without animated, despite the fact that it is responsible for more than 70% of modern attacks on malicious programs.

To hold a recent A state security report report The main major problems facing security executives with employees using the web browser for most of their work. The reality is that Traditional security instruments are blind to what is happening in the browserAnd the attackers know it.

Main conclusions:

  • 70% of phishing companies stands for Microsoft, OneDrive or Office 365 to use users’ trust.
  • 150+ trusted platforms Like Google Docs, and Dropbox are exposed to phishing and operating data.
  • 10% tips AI Include a tangible business conte by creating risks on thousands of AI-based tools.
  • 34% File download The company goes to personal accounts, often unnoticed.

New attack models bypass traditional defense

From phishing kits that are transformed in real time, to JavaScript accounting data, attackers bypass firewalls, SWGs and even EDRS. Here’s how:

Collect malicious programs in your browser

Threats are delivered as fragments that are activated only when gathering inside the browser – creating them invisible to network or final tools.

Multi -stage phishing

Phishing pages dynamically provide different content, depending on who views – users see scanning and scanners do not see anything. Microsoft remains the embodiment of the purpose.

Life on trusted platforms

The attackers hide behind the URL from the reputable Saas platforms. Security tools allow this by default – providing the opponents a clear path.

The security stack must develop to identify, analyze and respond to the threats where they actually occur: inside the browser. Based solely on the perimeter -based protection, such as SWG and network safety tools are not enough.

AI: Next great (non -measured) risk of safety

Since 75% of employees using generative IIMost businesses do not know what data is inserted into models such as Chatgpt Albo what’s in the background make the browser. Unlike traditional applications, AI’s tools do not have a specific security limit.

IT Safety Camings often leave reactively to the adoption of II rather than actively manage it. Traditional political approaches to combat the adoption of II because:

  • AI applications are quickly created, making static permits/deny lists ineffective.
  • Employees often switch between personal and corporate use of II, further blurring forced execution.
  • Many AI models are built into other platforms, making the detection and control even more complicated.

This leads to inconsistent management when security groups face the problem of determining and implementing policies in conditions that have no precise use limits.

As the rules of AI, visibility and control over the adoption of the II will be reinforced, it will be obligatory and no longer optional. Organizations should monitor the use, detection of risks and sensitive data on the data fastening. Tomorrow Active Monitoring lies the basis for the II management tomorrow.

DLP can’t keep up with your browser

LEGACY data loss prevention systems have been designed for email and final points not for today’s workflows. The browser has become the main data channel, but traditional DLP solutions can only see where network traffic is sent, not actual data processing.

Modern Data Expressing Risks include:

  • Insert API key into the browser -based tools
  • Loading documents to Google Person
  • Copies customer data from AI assistants

Even well-gap employees can unintentions to trace IP when switching between work and personal accounting records that outdated tools cannot detect.

With more data moving through the browser than if -earlier, DLP must develop to recognize the context of the application, the user’s actions and the business intent. The only DLP model based on the browser will give the security team to apply a consistent data protection policy in all directions by performing high -risk action control.

The problem of expanding no one looks

Despite the minimum technical evolution over the years, the browser expansion now has unprecedented access to sensitive organizational data and user identity. While security groups are strictly controlled by software updates, patches and final security policies, expanding remain the surface of the attack, often ignored within the traditional safety framework. During the User data research, the team found: the team found:

  • 46% Extension serves as a case of performance.
  • 20% Travel in the lifestyle category – like purchases or social plugins.
  • 10% are classified as a high or critical risk of excessive permits.

Permits that allow access to the full page, session tracking, or network interception are still too common in extensions loaded from trusted markets.

Because expansion continues to serve both productivity and safety commitments, enterprises should implement stronger review processes, visibility control and active protection to provide the browser from the inside.

Download full report.

The shadow lives in the browser

Shadow is no longer just random use of unauthorized applications – this has become a major problem for the security of the enterprise. Employees regularly accept applications for SAAS, personal file sharing services and third -party tools unattended by IT, often integrating them into daily work with real business data.

Employees of different functions of work regularly interact with several organizational cases of the same application – often without recognizing the effects of safety.

  • Marketing and creative teams: A marketing group member can mistakenly download assets from Google Drive partner instead of the company’s official instance, which will lead to unintentional data impact.
  • Consultants and Customer Role: Consultant working with multiple customers can access SharePoint websites characteristic of the client, unknown by creating safety gaps because sensitive data is distributed in various organizations.
  • Professional services and external cooperation: branches such as legal and accounting, which are heavily based on external cooperation, often employees work in 15+ different specimens of SharePoint, introducing significant problems in the data monitoring.

This explosion Shadow this It creates large spaces in safety, in particular as a completely process of growth platforms.

Instead of classifying applications as corporate or consumer, security teams must evaluate the intention of interaction of employees, the context of the account used tools, and the risk of real -time SAAS activities. This means to go beyond static policy to accept dynamic risk assessments, access control and constant monitoring. The browser became the most important point of visibility, revealing the entrances, switching accounts, the status of the Foreign Ministry, requests for access to consent and data movement across the organizational boundaries.

The way forward: the visibility and management of the browser

The awareness report provides a comprehensive understanding and data points that prove that safety should move inside the browser. As the phishing campaigns are developing, malware collection is becoming more sophisticated, the use of the II takes off, and the browser extensions are left without check, organizations that have not adapted will remain vulnerable.

Security teams must integrate the browser security into their enterprise security stack to get visibility in real time, to identify the threats engaged in the browser, and to protect the people where they work.

Request a personalized demonstration If you want to know more about the protection of your organization from the browser -based threats.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.