What Is a Backdoor Attack?

A backdoor attack is a type of malware that gives cybercriminals unauthorized access to a website. Cybercriminals install the malware through unsecured points of entry, such as outdated plug-ins or input fields. Once they enter through the back door, they have access to all your company’s data, including customers’ personal identifiable information (PII).

As the name suggests, a backdoor attack is stealthy, and cybercriminals often slip in undetected.

Read More

Joomla! 3.9.13: A security fix release for the 3.x series of Joomla!

The beginning of November brings us a brand-new update for the Joomla! 3.x series that addresses two new security vulnerabilities and improves the overall user experience by addressing 15 bug fixes. As of November 5th, you can download or update to the latest version, which is 3.9.4. All security vulnerabilities are considered low; however, it is still advisable to update your Joomla! installs as soon as possible to avoid any potential issues.

Read More

Breached on Black Friday? 56% of Consumers Won’t Return Until After Christmas

The holidays are just around the corner, and with it comes the inevitable holiday shopping rush. In fact, holiday shopping can account for up to 30 percent of annual sales for online retailers.  As Black Friday kicks off what is expected to be another lucrative online holiday season, there are vast opportunities for cybercriminals to steal shopper’s information through spoofed websites, malicious coupon code links, and phishy marketing campaigns. Any downtime resulting from an attack can severely impact holiday profits, not to mention annual revenue. This time of year, it’s more important than ever that ecommerce businesses make cybersecurity a top priority in order to protect their website, customers, and bottom line.

Additionally, consumers should be aware of the risks that exist online to defend their information proactively. Being cyber-aware while shopping online is the new reality for consumers, and it becomes even more imperative during the holiday season. 

Read More

How to Stop Phishing Attacks in Their Tracks

In the world of cybersecurity, the looming menace of advanced persistent threats and state-sponsored attack groups tend to dominate the headlines. However, research indicates that phishing attacks are the most common threat — by far.

Microsoft’s “Security Intelligence Report, Volume 24” shows a 250% increase in the number of phishing attacks since 2018. If you think the primary victims of email-related breaches are large corporations with vast amounts of data, think again. Small and mid-size businesses are now the preferred target of cybercriminals, and these organizations have a lot to lose. In fact, 60% of them fail within six months of a cyberattack.

To avoid becoming a victim, it’s critical to prevent phishing attacks.

Read More

Why Business Growth Should Mean Cybersecurity Growth

Your small business is growing fast. That’s good news! But rapid growth also presents new challenges. Perhaps most importantly, as sales and website traffic increase, you become a more attractive target for cybercriminals.

At SiteLock, we developed a proprietary risk score based on over 500 variables to help website owners gauge the overall risk of their sites on a scale from low to high. Each of the variables can be grouped into three main categories: a site’s complexity, its popularity, and its composition. In general, the more variables a site has, the higher the risk level. Those websites deemed high risk are 26 times more likely to experience a breach.

Read More

Our Top 3 Tips for Preventing Ransomware Attacks

Modern cybercriminals have an array of weapons in their cyber arsenals. As technology evolves, their tools and methods continue to become more sophisticated. Ransomware is among these weapons — and it poses a significant threat. Cybersecurity Ventures estimates that a ransomware attack targets a business every 14 seconds, and that number will fall to 11 seconds by 2021. Because no business is too small to become the target of a ransomware attack, it’s important to understand how to proactively defend your organization.

Read More

Where do the 2020 Candidates Stand on Cybersecurity Awareness?

The ugly news about Russian interference in the U.S. presidential election forced the issue of cybersecurity into the political spotlight in 2016. Since this catalytic event, political leaders have grappled with cybersecurity awareness on a global stage — and not all have done so gracefully.

Bad actors, whether politically motivated or not, grow increasingly sophisticated as our world becomes more rooted in technology. However, it appears lawmakers aren’t prepared for this reality. One example: too many are in the dark about website encryption — 61% of world politicians’ websites aren’t HTTPS-secured.

Read More

How to Stop a DDoS Attack on Your Website

In a matter of minutes, a distributed denial-of-service — or DDoS — attack can bring your website traffic to a grinding halt.

In the past, these attacks were more of an annoyance than a serious threat, but this has changed. DDoS attacks are growing in both size and frequency. Major attacks saw a 967% increase between the first quarter of 2018 and the first quarter of 2019. Recovering from an attack like this could cost a small business hundreds of thousands of dollars.

Read More

malicious plugin

Getting Dorky: How bad actors can leverage Google Dorks for attacks

If you are like most people, you use Google to search the internet for news, recipes, and pictures of cats. You type in your query, search, and most likely select the first link that Google returns. If you are a savvy user, you know how to use a colon to search specific sites or quotes to find specific words in your search. If you are a hacker, you most likely know how to Google Dork.

Google Dorking, or “Google Hacking,” got its start back in the early 2000s when a hacker realized Google could be used to uncover sensitive data with well-crafted queries. Fast forward to today, and the Google Hacking Database is brimming with over five thousand queries that can be used to find vulnerable information.

Read More

Building a Secure Website In 30 Minutes Or Less

When building a business website or blog, it’s essential to make your website’s security a top priority. In addition to learning how to build a website, any small business owner or blogger should understand how to secure their website. Although the topic of website security might sound complicated, it doesn’t need to be a long, drawn-out process. Today’s post will cover useful tips for building a secure website or blog in thirty minutes or less.

1. Keep Your Website Up-To-Date

Read More

Page 1 of 68

Powered by WordPress & Theme by Anders Norén