Fixing the HTTPS Security Blind Spot

Share Article

In a new article, eMazzanti Technologies shows business owners how to secure internet traffic they thought was secure but is not

News Image
Viruses, ransomware, just about anything that you can imagine can get through. Firewalls are blind to threats coming in with encrypted data when not setup properly to inspect this traffic.

eMazzanti Technologies, a NYC area IT consultant and MSP, presents a solution for businesses to the current HTTPS internet traffic data security loophole in a new article on the company’s website. The company urges business leaders to take a proactive small business data security approach to mitigate the growing problem.

“Viruses, ransomware, just about anything that you can imagine can get through,” stated Almi Dumi, Project Lead, eMazzanti Technologies. “Firewalls are blind to threats coming in with encrypted data when not setup properly to inspect this traffic.”

“Rapidly increasing encrypted HTTPS web traffic is creating a security blind spot in business computer networks, allowing destructive malware to slip by unnoticed by conventional network defenses,” the article begins.

Below are a few excerpts from the article “Fixing the HTTPS Security Blind Spot”.

“The problem exists because files downloaded and websites accessed over HTTPS may be transporting malicious content that is hiding behind TLS and SSL encryption. Network security appliances, such as unified threat management (UTM) firewalls are not concerned with the encrypted traffic and therefore fail to detect the threats.”

“Hackers know about the HTTPS blind spot and work aggressively to exploit it. They see that the growing amount of HTTPS traffic creates an ever-larger opportunity to profit from cyber-crime.”

“IT security engineers at eMazzanti Technologies, a NYC area IT consultant and MSP, report that, “a significant amount of malware is coming through the HTTPS channel,” including viruses, ransomware and other types of threats. A majority of it slips through as email attachments or website data. If an organization is not decrypting and monitoring the traffic, network security devices can’t see the threats.”

The article concludes with the following warning and HTTPS Security Checklist:

“HTTPS security attacks will continue to increase as encrypted web traffic increases. Criminals will go where the opportunities exist. Organizations that are interested in preventing attacks by intercepting threats might consider these steps:

1.    Work with an experienced data security professional to assess the threat to your organization.
2.    Review privacy laws and regulations, the organization’s privacy policies, and employee concerns.
3.    Implement a DPI solution with on-site assistance from qualified IT security professionals.
4.    Adopt a security-first mindset and use state-of-the-art data security as a competitive advantage.

HTTPS security threats represent a real and growing threat to enterprise data security. It’s time to fix the HTTPS blind spot to make once secure internet traffic secure again.”

Read the full article here.

Related resource information:

eMazzanti to Partner with PCI Security Standards Council to Improve Payment Data Security Worldwide

eMazzanti Technologies Offers No-cost Security Assessment to Help Business Owners Identify Data Security Threats

About eMazzanti Technologies

eMazzanti’s team of trained, certified IT experts rapidly deliver cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring and support to increase productivity, data security and revenue growth for clients ranging from professional services firms to high-end global retailers.

eMazzanti has made the Inc. 5000 list five years running, is Microsoft’s Partner of the Year and Northeast Region Partner of the Year and a 5X WatchGuard Partner of the Year. Contact: Carl Mazzanti 201-360-4400 or Twitter: @emazzanti Facebook:

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Carl Mazzanti
Follow us on
Visit website