AIMultiple ResearchAIMultiple Research

Top 4 Secure Web Login Best Practices for Corporations in 2024

Business workflows rely heavily on web applications as they:  

  • Aid supply chain activities via enterprise resource planning (ERP) systems.
  • Provide a platform for sales. 
  • Financial institutions employ online channels to conduct business. 
  • Nearly every firm has a crucial web application located on-premises or in the cloud.

On the other hand, the internet is a dangerous environment where a cyberattack occurs almost every 10 seconds. Therefore, improving the security of digital platforms is critical for enterprises. This article will review the top 4 best practices that enhance online business security. 

1. Filter URLs and DNS

Filtering internet content allows organizations to restrict users’ and visitors’ access to the specific web material. The main rationale is to keep the user safe from phishing attacks or malicious websites. Furthermore, some businesses prefer URL/DNS filtering to keep employees away from time-consuming and bandwidth-intensive online activities like social networking platforms.

Internet filtering solutions are powered by web reputation services which measure a risk score for websites by considering: 

  • The number of visits. 
  • The threat history of the domain’s pages. 
  • The age of observation.
  • Location. 
  • Related networks. 
  • Internal and external links. 

Nevertheless, some filtering platforms allow manual blocking opportunities. The main internet filtering tools for businesses are firewall, secure web gateway (SWG) and secure access service edge (SASE) solutions.

  • Firewall: It filters information on the internet subject to parameters like:
    • IP addresses
    • Ports 
    • Domain names
  • SWG: It is a gateway that verifies the data transit between users and the internet complies with predetermined company standards. SWGs are effective instruments for promoting the least access principle, which restricts each worker’s access to data and ensures a zero-trust approach to cybersecurity throughout the organization. The following are some of the applications for SWGs:
    • Filtering URL
    • Encrypting DNS traffic
    • Monitoring and recording online history of users
    • Detecting malicious software
  • SASE: It is a cloud-based cybersecurity system that integrates network and security services into a single platform (See Figure 1). As a security as a service component, SASE solutions often include firewall as a service and SWGs. As a result, they’re useful for internet filtering.

Figure 1: Components of SASE

SASE has network and security components. SD-WAN, carriers, content distribution networks and edge equipment are part of network as a service components of SASE. FWaaS, zero trust network and SWG are part of security as a service components.
Source: AIMultiple

2. Enforce users to create complex passwords 

Many people generate passwords that are short, contain personal information, and do not feature capital letters or special characters. As a result, brute force attackers that randomly guess passwords in the hopes of finding the correct one have a better chance of succeeding.

To improve cybersecurity posture companies should:

  1. Enforce users to create a password that contains at least:
    1. One uppercase letter
    2. One lowercase letter
    3. One number
    4. One special character
  2. Determine a minimum required character threshold to reduce the probability of hacking.
  3. The login page should not indicate whether the username/email address or password is incorrect. Such information increases the chance of brute force attackers. 
  4. Companies should enforce users to periodically renew their passwords.

3. Implement multi-factor authentication and limit session length

There is always a possibility of guessing someone’s password correctly. However, doing it twice or more consecutively is almost zero. This is the main rationale behind multi-factor authentication; adding one or more layers to the login process.

Multi-factor authentication tools cooperate with different tags that only the user can reach or know. For instance, when a company works with Google authenticator to ensure multi-factor authentication, users reach a code that they can see through their mobile phones. Similarly, banks send text emails to their customers, which include the password for the second security layer.

Setting specified thresholds for active sessions is another key security protocol that businesses should employ. Companies can require their users to re-enter the platform in this way, significantly enhancing the network’s security.

4. Store sensitive and regular data separately and ensure the least possible access

Storing company data in a single location and granting access to a large number of employees is risky. Almost 50% of executives believe that employee errors are the leading cause of a data breach at their firm. As a result, businesses should establish a hierarchy for their data (restricted, private, public, etc.), store it in distinct databases, and grant the fewest possible permissions to access it.

To ensure granular access, companies should adopt technologies that work with the zero trust principle, such as:

  • Software defined perimeter (SDP): SDP hides web hardware from outside entities and hackers (DNS, networks, etc.). SDP can be thought of as an updated version of VPNs that decreases traffic latency and solves granular access issues. Due to SDPs’ superiority, 60% of firms have replaced VPNs with SDPs.
  • Zero trust network access (ZTNA): ZTNA is an IT safety solution that allows for secure remote access to a company’s programs, data, and services based on specified control policies. ZTNA employs an application layer protection that adheres to the idea of least privilege. Thus, rather than granting workers access to all data on the network, it allows them to see only the data they require to fulfill their tasks.

Our sortable/filterable list of SWG vendors can help you choose the right partner for your business.

To find more regarding cybersecurity solutions, you can contact us:

Find the Right Vendors
Access Cem's 2 decades of B2B tech experience as a tech consultant, enterprise leader, startup entrepreneur & industry analyst. Leverage insights informing top Fortune 500 every month.
Cem Dilmegani
Principal Analyst
Follow on

Cem Dilmegani
Principal Analyst

Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 60% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised businesses on their enterprise software, automation, cloud, AI / ML and other technology related decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

To stay up-to-date on B2B tech & accelerate your enterprise:

Follow on

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments