Browser Security in Light of Cyber Attacks


The average cost of a data breach is $7.35 million. According to a recent study by Google, third-party data breaches have exposed 3.3 billion credentials, and 7% of passwords that were part of those credentials were tied to other accounts. Unfortunately, attackers are only getting smarter, and cyber attacks are only increasing in frequency. This makes it all the more imperative that consumers and IT organizations examine their security posture, including browser security.

Reexamining browser security is a great step to take when any new cyber attack emerges. In October 2017 the KRACK attack surfaced, and we published a video discussion between our Chief Product Officer Greg Keller and Senior Success Engineer Scott Reed. In this video, they discussed five steps anybody could take to improve their WiFi security in response to KRACK. However, all five of these steps are great to take in light of any cyber attack. In the video, Greg Keller and Scott Reed recommend the following:

  1. Use patched, secure devices
  2. Avoid public wifi
  3. Browse securely (HTTPS)
  4. Leverage existing VPNs
  5. Implement RADIUS

This post will focus on browser security, but you are more than welcome to read all of the recommendations here or watch the discussion at the bottom of the post.  

A Brief Overview of KRACK

wifi security

First, what is KRACK? Vulnerabilities within the WPA2 protocol were discovered and exploited in order to undermine WiFi security. Known as the Key Reinstallation Attack (KRACK), this approach provides attackers with the opportunity to see information that is normally encrypted, like passwords and credit card numbers, when exchanged in a network. The KRACK attack affects both WiFi clients and access points, and has been a major cause for concern for IT admins and consumers. One simple, yet effective step anybody can take to address this concern is to reexamine their browser security.

Reexamining Browser Security in Response to Cyber Attacks

With the amount of work productivity that takes place in web-based applications, and consequently in the browser, browser security has become a critical component to security posture. There are a couple of steps you (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm