In Today’s Web 2.0 Environment, Proactive Security Is Paramount. Are You Protected?
The internet today is a different mechanism than it once was. Widely referred to as "Web 2.0", today’s internet is a place where the boundaries of the enterprise are no longer clear and this has had a ripple effect on network security.
The enterprise must be protected from malware (malicious software), regulatory compliance must be ensured, data leakage prevented, and employee productivity must be managed. These security issues exist for all IP-based traffic, whether email, VoIP, instant messaging, Web access, file transfers, or other enterprise applications communicating over IP. In short, business use of the Web and Web 2.0 applications expose organizations to both inbound and outbound security threats which transcend the legacy security measures for Web 1.0. The new generation of emerging security threats now consists of malicious attacks led by cyber criminals targeted at specific organizations for personal or financial gain. This paper outlines these new threats and discusses the limited effectiveness of legacy Web security solutions against those threats. The paper then outlines the new proactive security paradigm that is necessary for securing Web 2.0 applications and protecting the enterprises that use them on a daily basis.Let’s begin by outlining today’s Web 2.0 threats.