Switching browsers might protect you against software security problems for now, says Mike Fratto, but in the long run it's a strategy that's destined to fail.
Information security experts, analysts, consultants and family computer whizzes have been urging Internet Explorer users to move to Firefox, because Firefox is thought to be "more secure" than IE. And so the masses are starting to move. Studies show Firefox reaching between 7 percent and 10 percent penetration, up from less than 1 percent in June 2004.
We could count up the number of known vulnerabilities for the various browsers and then rank them inversely, but that's a fool's game. If a browser has a vulnerability, and you have that browser on your hosts, you have a problem.
Sure, you might gain some short-term relief by switching to a browser that's not susceptible to the current crop of vulnerabilities, but long term, this wait-and-switch strategy doesn't bring a net gain in security. As browsers like Firefox and Opera gain popularity, they'll be subject to more vulnerabilities and exploits. It's a phenomenon similar to Sutton's Law, coined when Willy Sutton, asked why he robbed banks, which are better guarded than offices, replied: "That's where the money is."
We can't forsake Internet Explorer, either. Browsers aren't like Web servers or office suites. Browsers must process arbitrary data formatted to various standards and, further complicating matters, pass data to modular plug-ins like Macromedia Flash, Adobe Acrobat and Java Virtual Machine for processing.
Consider the browser as a development framework and you'll see why many enterprise applications are written and tested specifically for IE and use ActiveX for client-side processing. ActiveX controls often must read and write to the local hard drive and use local resources. Limiting development to a small subset of platforms is more efficient for the developer, but unlike standalone client software, the browser is a general-purpose application, resulting in Web applications that require special permissions to run properly. It's a mess.
The oft-mentioned solution is to educate end users to practice safe hex. Don't download applications off the Internet, read dialog boxes that pop up before clicking "Yes"--and make other (unlikely) behavioral changes.
The real solution, though painful, is to limit browsing activity. Most people in your organization probably need Internet access to do their jobs, but who needs what access and when do they need it? The browser is a tool to view information. How you use that tool is far more important than which tool you select.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.