Authentic8 Blog Category: Morale Browsing

Operation “Shields Up”: Web Isolation in the U.S. Military

How can government organizations, private enterprises, and academic institutions minimize the cybersecurity and privacy risks associated with accessing the internet from desktop or mobile devices?

Valuable pointers come from the defense sector. A new case study, titled Shields Up: How a Military Unit Simultaneously Increased Network Access and Decreased Cyber Risk [PDF], showcases how Authentic8's remote browser isolation technology enabled a U.S. military unit to implement internet policies for personal web access, without increasing the risk of introducing any malware or malicious code into the unclassified network.

The growing need to access publicly available information (PAI) on the web and to leverage the internet for both official and personal business (check out my post on "morale browsing") is making secure access to the broader network a necessity for more military personnel.

"Shields Up" shows how remote browser isolation with Silo Cloud Browser is supporting this change process. Silo enables and secures responsible web use in organizations for which the security risks

Do You Have What It Takes to Prevent Ransomware?

Malicious software has nearly always been a factor to consider when it comes to managing the IT environment. Have we learned the right lessons?

*

I remember going on calls to a credit card company early in my career, as a then-time field engineer, to diagnose issues that had cropped up on several Dell PCs.

Back in 1991, these were basic PCs with floppy drive systems and 10MB hard disk drives - state-of-the-art desktops at the time, monochrome screens and all.

After some analysis, we concluded that the systems were infected with a virus, a rare occurrence at the time. The Michelangelo virus was just days away from executing, and our options to remove it were limited.

Only two vendors existed to clean malware, and the software had to be downloaded using a 1200 baud modem from a bulletin board. Usually, one vendor or the other would detect and remove the small number of malware samples in the wild at the time. Thankfully,

Morale: Recruitment, Retention, and Browsing

During my tenure as the Commanding Officer of the Navy’s defensive cyberspace operations team, I distinctly remember an exit interview with a civilian teammate. He sat across from me and proudly stated that though he loved our team, he was ready to leave and willing to take a pay cut for the opportunity ahead of him (note: he wasn’t taking a pay cut, but he was willing to).

He enjoyed his teammates, he told me, appreciated his leadership, was motivated by our mission, and felt appropriately compensated. Given that dissatisfaction - and not satisfaction - with any one of those job aspects usually serves as reason people decide to look elsewhere for employment, I was perplexed.

My departing teammate went on to explain: “I am a geek. I love technology. I want to be on a team that uses the latest and greatest hardware and software. I want to be able to connect with the outside world from my desktop.