Holes in IE Protected Mode leave other apps vulnerable, too

Verizon Business researchers write blueprint for IE weaknesses

By  

It also underscores, along with the WikiLeaks threat to post corporate documents as well as government info, the need for comprehensive data-loss protection software and some level of assistance or control over user settings at the endpoint.

Some security gateways will filter and reject users trying to connect if the machines they're dialing in with don't satisfy a set of security configuration requirements -- having functional, up to date antivirus software, Windows security settings that don't wave provocatively at hackers and malware every time your users go outside the firewall -- anything you want.

It will increase the amount of work you have to put into each machine and into training each end user, at least for a while.

But if you're not about to convert most of your desktops and mobile client hardware to virtualized versions, you're way too exposed, to the point that it's almost irresponsible not to use WikiLeaks and the holes in Protected Mode to push for solid, consistent client-side security, even if business unit managers have managed to resist it in the past.

Kevin Fogarty writes about enterprise IT for ITworld. Follow him on Twitter @KevinFogarty.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness