Monday 16 March 2015

Enterprises Losing Billions Due to Vulnerable S/W Applications




Forbes recently published an article called '#1 Cyber Security Threat to Information Systems Today', based on the survey conducted by Sungard Availability Services. 55% of respondents gave the top spot to vulnerable web applications.

According to Joe Caruso, the founder and CEO of GDF (Global Digital Forensics), a leading cyber security provider in New York, 'There are a few factors that converge to make applications a tricky cyber security concern for many organizations'.

Organizations today use so many web apps on so many different platforms that the numbers can get dizzying, not to mention the human resource and tools required to keep tabs on security. Then, there are a large number of developers creating apps, who come from every corner of the world with promises of offering customized apps at low costs. But, most often than not, security is not a part of the codes. They are able to provide functionality, effectiveness and convenience, but the safety features are not up to the mark. If security is not a part of the development cycle of an application, organizations can find themselves at the risk of cyber-attacks that can exploit their most valuable and sensitive data. Such attacks can prove to be very costly as well as messy for an organization.

The most effective software security solutions prioritize threats , from both the cause and effect standpoint. Complete in-depth testing of applications is usually not an option. It may be possible for a small company with limited amount of apps, but for a bigger organization that has thousands of apps on the books and where new applications are being implemented all the time, the expense and man-hours related to testing would be restrictive.

But, all apps are not the same, some do not pose a threat as they are not connected to sensitive company information and client data. They do not provide a gateway to intruders and they are of lower priority than others, which may be of medium or high risk. Specialized tools are required to judge the risks as there may be a lot of room for interpretation. Specific methods and expertise is required to approach the problem, for any real hope of success.

Vulnerability Tests to Determine the Risks

A skilled vulnerability assessment is required to determine the risks posed by every application. These assessments may include comprehensive penetration testing of every application, which determines whether they are susceptible to attacks.










No comments:

Post a Comment