Importance of Internet Security and Setting Up an Office Proxy Server

Set Up an Office Proxy Server
to Limit Staff Web Surfing
ASAPS 2014 Practice Changers
James M. Nachbar, MD, FACS
April 2014
Or http://www.nachbar-github.com
https://github.com/nachbar/network-security
Practice Changers
April 28
, 2014
Relevant Industry Relationships
I have the following relationships with
Practice Enhancement Specialists
(formerly Inform Solutions/Mentor Solutions)
:
Author of the InSched Scheduling Program & IntelliPract Billing System
and Paperless Charting
Author of PatientConnection appointment reminder and lead
management system
I receive royalties for sales, maintenance, and operation of those systems
Presentation Level of Evidence = 
Presentation Level of Evidence = 
V
V
Levels of Evidence and Qualifying Studies (Therapeutic Studies):
Levels of Evidence and Qualifying Studies (Therapeutic Studies):
I
I
          High-quality*, multi-centered or single-centered, randomized
          High-quality*, multi-centered or single-centered, randomized
 
 
controlled trial with adequate power 
controlled trial with adequate power 
(N ≥ 100)
(N ≥ 100)
; or a systematic review
; or a systematic review
of these studies
of these studies
II 
II 
        Lesser-quality, randomized controlled trial; prospective cohort
        Lesser-quality, randomized controlled trial; prospective cohort
study; or systematic review of these studies
study; or systematic review of these studies
III
III
        Retrospective comparative study;  case-control study; or a
        Retrospective comparative study;  case-control study; or a
systematic review of these studies
systematic review of these studies
IV
IV
        Case series
        Case series
V
V
      Expert opinion; case report or clinical
      Expert opinion; case report or clinical
example; or evidence based on physiology, bench
example; or evidence based on physiology, bench
research or "first principles“
research or "first principles“
*“High quality” is open to interpretation. Until more specific guidelines are promulgated,
*“High quality” is open to interpretation. Until more specific guidelines are promulgated,
100
100
 is the absolute minimum power, sample size or “N” which is acceptable for any
 is the absolute minimum power, sample size or “N” which is acceptable for any
study to be considered Level 1.
study to be considered Level 1.
Importance of Internet
Security
 
So, How do they get in?
Because Windows, Mac, Internet Explorer,
Firefox, Chrome, etc. etc. etc. have flaws
So, How do they get in?
When a flaw is discovered, hackers figure out
how to “exploit” it almost immediately
Zero-Hour Attacks
 
 
 
 
 
 
 
A new zero day vulnerability that resides in all versions of Internet Explorer
has been spotted in the wild, Microsoft confirmed late Saturday.
The vulnerability, which could allow remote code execution, is being used in
"limited, targeted attacks," according to an advisory issued by Microsoft.
While all versions of the web browser, IE 6 through 11, are affected by the
vulnerability, attacks are currently targeting IE versions 9, 10 and 11,
according to security firm FireEye, which first reported the flaw Friday.
The attack leverages a previously unknown "use after free" vulnerability –
data corruption that occurs after memory has been released -- and bypasses
both Windows DEP (Data Execution Prevention) and ASLR (Address Space
Layout Randomization) protections, according to FireEye.
The vulnerability is currently being exploited by a group of hackers targeting
financial and defense organization in the US, FireEye told CNET.
"The APT [advanced persistent threat] group responsible for this exploit has
been the first group to have access to a select number of browser-based 0-day
exploits (e.g. IE, Firefox, and Flash) in the past," FireEye said. "They are
extremely proficient at lateral movement and are difficult to track, as they
typically do not reuse command and control infrastructure."
Your Biggest Problem
Your Friendly Staff will happily surf the web to
any “interesting” pages, and get your
computers infected.
Paper charts too large to take or move in bulk
Your entire EMR file will easily fit on a USB
stick – just ask Edward Snowden or Bradley
Manning!
If you allow your staff to
surf the web on office
computers, you WILL
suffer an attack.
 
So, if you need your staff
to use the web, what can
you do?
So, if you need your staff
to use the web, what can
you do?
Answer:  Limit the sites they can
surf to using a Proxy Server
What is a Proxy Server?
A Proxy Server acts as your Proxy on the Internet.  Your
browser is set up so that it cannot directly access any
websites, but rather passes any requests for a web page
to the Proxy Server.
The Proxy Server checks to see if the website is on the
“Allowed List”.  If so, it goes to that site and gets the
info and passes it back to the browser
If the website is not on the “Allowed List”, it passes a
page with an error message.
What is a Proxy Server?
 
 
 
 
 
 
 
You obviously also need a
Firewall to prevent direct
access to websites outside
of your Proxy Server
Zero-Hour Attacks will infect computers that
go to websites with a browser with a flaw in it.
A Zero-Hour Attack on all versions of Internet
Explorer was announced Sunday, April 27, 2014
If you let your staff surf the web from office
computers, you WILL become infected.
You can limit the sites they can surf using a
Proxy Server, either internal or external to your
office
Web Browsing Danger
 
 
https://github.com/nachbar/network
-security
Or http://www.nachbar-github.com
Slide Note
Embed
Share

Learn how to enhance internet security by setting up an office proxy server to limit staff web surfing. Understand the risks associated with system flaws in Windows, Mac, browsers like Internet Explorer, Firefox, Chrome, and the immediate threat of Zero-Hour Attacks by hackers.

  • Internet Security
  • Office Proxy Server
  • System Flaws
  • Staff Web Surfing
  • Hackers

Uploaded on Sep 25, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Set Up an Office Proxy Server to Limit Staff Web Surfing { ASAPS 2014 Practice Changers James M. Nachbar, MD, FACS April 2014 https://github.com/nachbar/network-security Or http://www.nachbar-github.com

  2. Practice Changers April 28, 2014 Relevant Industry Relationships I have the following relationships with Practice Enhancement Specialists (formerly Inform Solutions/Mentor Solutions): Author of the InSched Scheduling Program & IntelliPract Billing System and Paperless Charting Author of PatientConnection appointment reminder and lead management system I receive royalties for sales, maintenance, and operation of those systems

  3. Presentation Level of Evidence = V Levels of Evidence and Qualifying Studies (Therapeutic Studies): I High-quality*, multi-centered or single-centered, randomized controlled trial with adequate power (N 100); or a systematic review of these studies II Lesser-quality, randomized controlled trial; prospective cohort study; or systematic review of these studies III Retrospective comparative study; case-control study; or a systematic review of these studies IV Case series V Expert opinion; case report or clinical example; or evidence based on physiology, bench research or "first principles * High quality is open to interpretation. Until more specific guidelines are promulgated, 100is the absolute minimum power, sample size or N which is acceptable for any study to be considered Level 1.

  4. Importance of Internet Security

  5. So, How do they get in?

  6. Because Windows, Mac, Internet Explorer, Firefox, Chrome, etc. etc. etc. have flaws So, How do they get in?

  7. When a flaw is discovered, hackers figure out how to exploit it almost immediately Zero-Hour Attacks

  8. A new zero day vulnerability that resides in all versions of Internet Explorer has been spotted in the wild, Microsoft confirmed late Saturday. The vulnerability, which could allow remote code execution, is being used in "limited, targeted attacks," according to an advisory issued by Microsoft. While all versions of the web browser, IE 6 through 11, are affected by the vulnerability, attacks are currently targeting IE versions 9, 10 and 11, according to security firm FireEye, which first reported the flaw Friday. The attack leverages a previously unknown "use after free" vulnerability data corruption that occurs after memory has been released -- and bypasses both Windows DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) protections, according to FireEye. The vulnerability is currently being exploited by a group of hackers targeting financial and defense organization in the US, FireEye told CNET. "The APT [advanced persistent threat] group responsible for this exploit has been the first group to have access to a select number of browser-based 0-day exploits (e.g. IE, Firefox, and Flash) in the past," FireEye said. "They are extremely proficient at lateral movement and are difficult to track, as they typically do not reuse command and control infrastructure."

  9. Your Friendly Staff will happily surf the web to any interesting pages, and get your computers infected. Your Biggest Problem

  10. Paper charts too large to take or move in bulk If you allow your staff to surf the web on office computers, you WILL suffer an attack. Your entire EMR file will easily fit on a USB stick just ask Edward Snowden or Bradley Manning!

  11. So, if you need your staff to use the web, what can you do?

  12. Answer: Limit the sites they can surf to using a Proxy Server So, if you need your staff to use the web, what can you do?

  13. What is a Proxy Server?

  14. A Proxy Server acts as your Proxy on the Internet. Your browser is set up so that it cannot directly access any websites, but rather passes any requests for a web page to the Proxy Server. The Proxy Server checks to see if the website is on the Allowed List . If so, it goes to that site and gets the info and passes it back to the browser If the website is not on the Allowed List , it passes a page with an error message. What is a Proxy Server?

  15. You obviously also need a Firewall to prevent direct access to websites outside of your Proxy Server

  16. Zero-Hour Attacks will infect computers that go to websites with a browser with a flaw in it. A Zero-Hour Attack on all versions of Internet Explorer was announced Sunday, April 27, 2014 If you let your staff surf the web from office computers, you WILL become infected. You can limit the sites they can surf using a Proxy Server, either internal or external to your office Web Browsing Danger

  17. https://github.com/nachbar/network -security Or http://www.nachbar-github.com

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#