Skip to content

Hit enter to search or ESC to close

The explosion of e-commerce websites in recent years shows all of us how much we depend on technology. Indeed, it was our culture’s acceptance of technology that helped us get through the worst of the pandemic’s stay-at-home recommendations. Most of us already live online lives. It was simply a matter of adjusting our work and play habits to accommodate Zoom meetings.

Unfortunately, even in the worst of circumstances, cybercriminals look for ways to infiltrate our lives. More times than not, it’s our own online actions that all but invite cybercriminals into our lives. As the line between online life and the physical realm blurs, hackers deploy tactics that look for hidden doors that even software developers missed. The result is this cat and mouse, tit for tat, exchange of attacks and counterattacks.

There’s no question that technology (like smartphones and the internet) facilitates entrance into the cyber world. However, this world is awash with bad actors wanting to take your digital “stuff,” not to mention our money and personal identities. We must all be hyper-vigilant about online security, especially when it comes to doing personal things on company technology.

Did You Know?

72%

businesses experienced a DNS attack

60,000

malware & spyware domains categorised a day

53

predefined categories by default

7%

of websites tested by Google for malware were infected

What Is DNS Filtering?

DNS stands for Domain Name Server. Whenever a device establishes a connection using the internet it must have a distinct string of syntax that identifies the device for a connection. It’s like going to a specific place on a map using geo coordinates.

Web browsers use IP and DNS protocols to determine what shows up on the web page. Said another way, web browsers have physical addresses that can be managed as a business web filter.

The Problem

Although mixing your private life with your professional life isn’t recommended by most experts, most of us have inevitably done so even if we didn’t know it. Visiting our favorite e-commerce store using a public wifi connection, or buying something from Amazon using your work email address are just two examples. Some even have personal packages delivered to their work, the ultimate physical blurring of the line between work and play.

While these actions might seem innocuous, it is this mixing of our private digital lives with our business digital lives that leads to hackers looking for those hidden doors. Our buying habits on e-commerce websites are only the tip of the iceberg. Underneath is a stealth cyberworld that a few bad actors know how to exploit. When your business deploys a business web filter these hidden doors get locks even cybercriminals have trouble breaking into

"Personal devices highlight the need for secure business content filtering that stops bad actors from conducting malicious attacks."

BYOD and Business Content Filtering

About a decade and a half ago, businesses at the enterprise level realized that employees had their own electronic devices with computing power equal to or better than their own. It wasn’t long before employees understood they could use their personal devices to do “work from home.” The flip side of this is using work electronic devices to do personal things. Personal devices highlight the need for secure business content filtering that stops bad actors from conducting malicious attacks.

Hence, bring your own device (BYOD) entered the business lexicon. More precisely, policies and rules about Bringing Your Own Device to work started showing up in HR handbooks throughout the enterprise world. The one flaw in policymaking and adherence that many didn’t see coming is human nature. Humans aren’t computers that blindly follow instructions.

We can just as easily not follow a BYOD policy. In other words, policymaking at the IT level only does so much. Humans break rules; it seems to be our nature. Business content filtering is the application of a business web filter that helps employees follow their business’s BYOD policies.

The Society for Human Resource Management (SHRM) published an example of a BYOD policy on its website. This is a robust document illustrating the seriousness of the matter. The primary focus is company security, i.e. preventing things like data leaks and hacks looking for Personal Information (PI).

While BOYD policies focus on using personal devices to do business work, businesses need protection from employees using work devices to do personal things like visiting Amazon or a favorite social media platform. The SHRM brings your own device policy and others like it are useless without protecting the enterprise from outside digital threats. A business web filter strengthens BYOD policies because it prevents employees from using enterprise technology to harm the business. BYOD is the lock with a business web filter as the key.

"Enterprise employees might tend to take for granted they have internet access at work."

Internet User Policies and Why You Should Have a Business Web Filter

Much of the enterprise world runs on policies where compliance is required so that a business runs according to its business functions. However, we either follow policies or we don’t. We have a choice, which causes headaches for those IT people that need to protect sensitive company records and other documents.

Enterprise employees might tend to take for granted they have internet access at work. This isn’t surprising. The always-connected nature of the internet and our personal devices means we think our personal devices don’t function without the internet.

Indeed, many of us see the internet like electricity–walk into a room, flip a switch, and it's there ready for use. Not so fast! At the enterprise level, the internet is a vital tool that cannot be turned off because of elements like data centers and cloud computing. 

The categorical need for the internet at the enterprise level weakens internet use and BYOD policies. The result is the need for an IT-based solution that compliments employee work policies. One highly effective tool is content filtering. However, given the nature of internet access and enterprise flexibility, content filtering needs to have a granular approach that can be administered at the user interface level.

For example, your business's internet use and BYOD policies state all employees must refrain from accessing social media from work even on personal devices. But, your marketing department has several social media-based advertising campaigns that require some employees to have access to the internet and social media. With WebTitan DNS filtering, you can apply users' policies at the workstation level.

Hear from our Customers

Safeguarded my web browser

For several years, WebTitan has supported us with a reliable web filtering tool that has served us well. We're confident that it's blocking and slowing traffic as we've set it up. Quite easy to set up, clients were quickly migrated from the old operation, and new clients were quickly onboarded. The monitoring functions are simpler to set up, and the data is displayed in a far more appealing manner. The ability to stop advertisement domains is part of content filtering; sure, this doesn't capture every ad site, but it's enough to make a difference. The greatest thing is that there is no charge for assistance. Any proposal I've made has received swift feedback and resolutions.

Nabila

Human Resources Manager

No IT staff - need to still monitor end clients this is for you

All positive - I love that we spoke to real people, no phone tag. They have been nothing but responsive when we installed and created our account. Very positive and I highly recommend them! We have used similar products but they kept changing the product and increasing the cost, they would have no customer support and you could not even email them. WebTitan has excellent support and service, they helped us set it up, configure it, and install it. They are super responsive on email their products works for exactly what we want it to do. It was the best solution for us to monitor some end clients without limiting the rest of the network or having something we could not easily access. For us it is the prefect product, something non-IT staff can set up monitor and use daily to limit risks by a completely open internet policy. This was exactly what we needed!

Mark

General Manager

Best web proxy I have ever used

What do you like best about WebTitan Web Filter? - LDAP authentication, profiles work regardless the user IP address. - can filter encrypted connections. - MANY options for access policy and filtering. - powerful reporting. - updates for category definitions and antivirus. - clear interface, easy to setup and maintain. - robust system, never crashes. Recommendations to others considering WebTitan Web Filter: I use it on premise, for cloud subscription you must give it a try. What problems is WebTitan Web Filter solving and how is that benefiting you? I can apply company policies for web access restrictions and isolate all the workstations from the Internet by allowing access only through proxy for some applications only (e.g. browser). Also can avoid (un)intentional access to malicious sites.

Chrysostomos V.

System Engineer

Excellent Product

What do you like best about WebTitan Web Filter? Very easy setup - 5 minutes to configure. Detailed reporting. Easy to use. Very good support. What problems is WebTitan Web Filter solving and how is that benefiting you? Filtering websites for malicious URL's.

Shlomi F.

VP Sales & Business Development

WEBTITAN CLOUD and the support teams are great. It is helping us a lot.

What do you like best about WebTitan Web Filter? WebTitan is practical to move, what I like most is the speed in the synchronism of the users and the function of the Cloud Key. What problems is WebTitan Web Filter solving and how is that benefiting you? The only problem we are trying to solve is when the user takes another user's policy when he accesses it. But it happens to few.

Daiana M.

Mid-Market

Enterprise Benefits of DNS Filtering

DNS filtering by WebTitan is the ideal solution for a business web filter that keeps your business safe. That said, there are many benefits of WebTitan DNS filtering, including:

  • Malware blocking: Most security breaches happen because a small human error lets malware into the system. DNS filtering prevents known malware attacks that have been discovered in the public realm. These include viruses and any phishing attacks that cybercriminals deploy regularly.
  • BYOD level security: Businesses should not ban employees from using wifi. Rather, they should deploy security that protects any and all devices that connect to the network.
  • A flexible business web filter: DNS filtering must address the human need to find the nearest web browser to do something personal.
  • Executive-level reporting: Data-driven reports help the business world function and even improve over time. Key people need executive-level reporting to protect their business interests.

In Review

WebTitan DNS Filtering adds a layer of cyber protection in a time when the enterprise could use it most. The security level advanced by DNS filtering allows for a granular business web filter that grows with a business as its tech needs increase. In closing, policymaking isn’t good enough for today’s cybersecurity needs.

Businesses must take control of their tech using the data the tech creates to run. In this way, WebTitan DNS Filtering puts the control in the hands that need it with simple to use data sets.

Susan Morrow

Susan Morrow

  • DNS FILTERING
  • WEB FILTERING
  • CONTENT FILTERING

Talk to our Team today

Talk to our Team today