• News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Saturday, April 1, 2023
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home Featured Articles Top Five Pitfalls Businesses Should Look Out For in Client Side Security
  • Featured Articles

Top Five Pitfalls Businesses Should Look Out For in Client Side Security

By
Prangya Pandab
-
September 13, 2021
66
Top Five Pitfalls Businesses Should Look Out For in Client Side-01

The importance of the state of the client device has been a point of contention in the security community for a few years. Client devices are a large unknown, and they can be infected with malicious malware or exposed to phishing attacks, malicious JavaScripts, and other client-side attacks.

When it comes to securing online applications and preventing fraud, businesses have typically relied on server-side detective and preventative controls. In other words, policies have long been a go-to technique for minimizing risk from security breaches and fraud occurrences, alongside data, logs, and transaction information. Recently, many businesses have begun to evaluate whether or not they should look at the client side environment as well, and if so, how they should go about doing so.

Here are the top five issues that businesses may face when it comes to client-side security:

Playing a game of whack-a-mole

Malicious JavaScript, banking Trojans, and other types of client-side attacks are abundant. They will also be around for a long time; so, once a company opens the Pandora’s box that is the client side, they can get quickly overwhelmed. Of course, each company must determine what, if any, action it will take when a client device is identified accessing an online application from a hacked environment. Any processes around this, if not built well, can quickly devolve into a never-ending game of whack-a-mole, burying the security and fraud teams.

Also Read: 3 Ways Artificial Intelligence and Machine Learning Aid and Hurt Cybersecurity

Losing sight of the risks

It’s critical to treat information about a hacked client-side environment as just that: information. While the information may be useful in determining the total risk to that client’s accounts, it is not a credible indicator of risk in and of itself. With so much stolen account information and compromised PII floating around, a fraudster can do Account Takeover (ATO) in a variety of methods. In other words, a compromised client device does not always imply that ATO will occur, and it does not always imply that the company will suffer a fraud loss. A variety of distinct data points are needed to make this conclusion, one of which being the condition of the client device. If this crucial element is overlooked, the company may lose focus on risk.

Losing sight of transactional focus

It’s critical to stay focused on transactions when attempting to limit risk and reduce fraud losses. It’s all too easy to get side-tracked by other data points that appear interesting but don’t give indications if a transaction is valid, suspicious, or fraudulent. While useful information on the client device can help establish whether or not a transaction is fraudulent, it is not enough to reach that decision without other crucial data points. If companies lose sight of this transactional focus, they are all too likely to slide into a never-ending cycle of false positives and noise that will eventually bury them.

Also Read: How Does Cybersecurity Perceive Artificial Intelligence?

Losing focus on sensitive information

When a company opens the door to the client side, it is common to be confronted with an overwhelming amount of data. If all of that data isn’t correctly processed, categorized, and triaged, it could result in a flood of alerts, the most of which may be useless. It’s critical to remember what’s really important: sensitive data that could end up in the hands of an attacker, as well as the ability to add, change, and/or remove transaction data. It’s also crucial to remember that, while magecart attacks are the most prevalent, they’re not the only way to attack. As businesses begin to look at the client side, they must stay focused on sensitive data in order to avoid getting overwhelmed with less important data.

Overlooking user experience

While it may be tempting to implement stringent, draconian measures in the fight against fraud, it is crucial to note that such strategies do not always result in reduced fraud. They may, however, have a detrimental impact on the user experience, resulting in revenue loss for the company. It’s critical to put in place sufficient safeguards to protect online apps from fraud, but it’s also crucial to realize that a friction-filled user experience will cost the company money in other ways. When a company overlooks this crucial balance, it exposes itself to a new risk: losing potential revenue to competitors.

For more such updates follow us on Google News ITsecuritywire News. 

  • TAGS
  • account takeover
  • ATO
  • banking Trojans
  • CEO
  • CIO
  • CISO
  • client device
  • Client Side Security
  • CMO
  • compromised client device
  • CTO
  • malware
  • phishing attacks
  • User experience
Previous articleMoody’s and BitSight Partner to Create Integrated Cybersecurity Risk Platform
Next articleThree Initiatives CISOs should prioritize in the Post-Pandemic Landscape
Prangya Pandab
https://itsecuritywire.com/
Prangya Pandab is an Associate Editor with OnDot Media. She is a seasoned journalist with almost seven years of experience in the business news sector. Before joining ODM, she was a journalist with CNBC-TV18 for four years. She also had a brief stint with an infrastructure finance company working for their communications and branding vertical.

RELATED ARTICLESMORE FROM AUTHOR

Bridging the Gap: Tips for Aligning Security Strategies with Business Goals

Bridging the Gap: Tips for Aligning Security Strategies with Business Goals

Security Threats to Big Data

Security Threats to Big Data

VPN: A Fallacious Cyber Threat Countermeasure?

VPN: A Fallacious Cyber Threat Countermeasure?

Latest posts

Three Ways To Secure Cloud Migration

Three Ways To Secure Cloud Migration

May 11, 2022
DARKTRACE AI STOPS CYBER-ATTACK EXPLOITING LOG4J VULNERABILITY AT GLOBAL FINANCIAL SERVICES PROVIDER-01

DARKTRACE AI STOPS CYBER-ATTACK

March 23, 2022
Instnt

Instnt Partners With Prove to Enhance Its First-of-a-Kind, Fully Managed, Digital Customer Onboarding Platform as...

October 8, 2020
Kemp

Kemp Acquires Flowmon for Predictive Network Performance Monitoring and Network Detection and Response (NDR)

November 9, 2020
APT

New “Earth Longzhi” APT Targets Ukraine and Asian Countries with Custom Cobalt Strike Loaders

November 15, 2022


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Bridging the Gap: Tips for Aligning Security Strategies with Business Goals
  • Security Threats to Big Data
  • 500k Affected by Data Breach at Debt Buyer NCB
  • Microsoft Cloud Vulnerability Ushered to Bing Search Hijacking, Disclosure of Office 365 Data
  • SlashNext’s 2023 Mobile BYOD Security Report Reveals 71% of Employees Have Sensitive Work Information on their Personal Devices; 43% Were the Target of Phishing Attacks

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy