As a rule, complexity is the enemy of security. When more applications are introduced, the number of attack vectors increases, making the application infrastructure as a whole more difficult to secure. If, for example, your organization plans on supporting the Google Chrome browser, you now need to stay current with attacks against Firefox, Internet Explorer, Chrome and all the plug-ins that may possibly be installed in them.
If politically your organization has already made the commitment to multiple browsers, make sure that you have some mechanism or procedure to stay up to date on the risk vectors of all of your third-party applications, not just browsers.
Related Q&A from John Strand, featured expert
In this expert response, John Strand explains what to do when your personal identity is impersonated online.continue reading
Expert John Strand reveals two exciting trends in antivirus software.continue reading
Expert John Strand reviews how to spot input validation flaws on your websites.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.