Counting Down the Top 10 Most Popular SiteLock Blogs in 2018

Is one of your New Year’s resolutions to learn more about securing your website? Maybe you want to dive into the world of malware and learn more about what it is and how it can be prevented. Or perhaps you want to understand what to do if a web host suspends your website due to a cyberattack. Whatever the reason, make 2019 the year you resolve to put cybersecurity first.

There is a lot of information on the web on this subject and with 155 SiteLock blogs published in 2018 alone–that’s a lot content to search through! We’ve made it easy for you learn more about cybersecurity and how to secure your website in 2019 by gathering our most popular blogs in one place. Join us as we countdown the top 10 most popular SiteLock blogs in 2018!

Read More

check website for malware

The Evolution of Malware Identification

Code is what allows website owners to customize their websites and make it unique. However, sometimes malware can sneak into that code, resulting in a potentially harmful impact to unsuspecting users. Using today’s techniques, how would you distinguish which code is good and which code is bad? And what will that identification look like in the future? In this article, we will discuss current malware detection methods and the future of malware identification. Plus, provide insight into the role machine learning can play moving forward.

Read More

CMS security update

The WordPress of the Future

WordPress has been a rock among the shifting sands of website building platforms, with a fifteen-year history in the space. While other platforms have come and gone, split into multiple platforms, or struggled to even get noticed, WordPress has been a steady force that nearly one-third of the internet relies on. On December 6th, we saw the release of what is largely considered to be the biggest change to WordPress ever seen. WordPress 5.0 has moved away from the Classic Editor, and implemented the new editor, Gutenberg.

Read More

WordCamp US 2018 – Blockbuster Security and a Legendary Cast

It’s been a whirlwind year of awesome WordCamps for us here at SiteLock. From East to West, and North to South, we reached all four corners of the United States. We even ventured over the border to Montreal and overseas to Serbia! To finish out an amazing year, we headed to the South one final time for one of our biggest events of the year—WordCamp US 2018 in Nashville, TN!

Read More

Breaking Into Website Security as a Career

My name is Nick and I’m a Web Security Analyst with SiteLock. After completing my first year in the cybersecurity industry I wanted to share my perspective on how to acquire the skills and knowledge necessary to break into this rapidly growing field.

Read More

Cyberattack Cost

The Shocking Cost of a Cyberattack [Infographic]

One successful cyberattack can cost your business as much as $427 per minute from the downtime it takes to recover. Learn the shocking cost of a cyberattack and how you can prevent one in this infographic.

Read More

ransomware

Why Businesses Need To Prevent Ransomware

Ransomware is an attack that can trick you into unnecessarily paying money to cybercriminals while causing you to lose your computer files forever. For businesses, these attacks can also result in a data breach and exposure of sensitive information. Mitigating ransomware is all about preparation and prevention, so we’ll walk you through why this attack occurs, and how you can defend against it.

What is ransomware?

Ransomware happens so frequently that it has a definition in the Oxford English Dictionary: “A type of malicious software designed to block access to a computer system until a sum of money is paid.” Payment is often requested in bitcoin, the popular cryptocurrency, or in gift cards that can easily be sent to a “burner” email address. Unfortunately, if you’re hit by one ransomware attack, you’re likely to be hit again – a survey by Sophos found that not only did 54 percent of respondents experience ransomware, they were likely to experience two attacks or more.

Read More

4th of July

The Beginner’s Guide to California’s Cybersecurity Laws

California has a history of creating legislation that creates a ripple effect that affects consumers in other states. While the laws only affect California, they often push companies into adopting the rules broadly – for example, California’s strict auto emissions standards have been adopted in 16 other states since 2004. “What California does definitely impacts the national conversation,” says state Senator Scott Wiener. As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time. However, these laws have also attracted criticism from tech companies, cybersecurity experts, and the Federal Government. These laws may come to affect you, which is why we’ve created this guide.

Read More

WCPDX 2018 recap

WordCamp Portland – Keeping Portland WORD!

This year has been quite the whirlwind of travel for me in my role as Community Evangelist here at SiteLock! It’s taken me from one end of the country to the other as a sponsor, speaker, and attendee, and every moment has been a blast. I’ve really enjoyed visiting so many different towns and WordPress communities. On Saturday, November 5, it was time to welcome people to my own town for WordCamp Portland 2018.

As co-Lead Organizer of WordCamp Portland, I was involved in all aspects of the event this year and we started planning all the way back in May! But on Saturday everything finally came together for one of our most successful WordCamps yet.

Read More

Alexa, Are My IoT Devices Secure?

The internet is everywhere, thanks to the Internet of Things (IoT). The term “Internet of Things” applies to any nonstandard computing device that connects to wifi and can transmit data.  Well-known examples of IoT devices include smart speakers like Amazon Alexa or Google Home, smartwatches like the Apple Watch, internet-connected baby monitors, video doorbells, and even toys.

However, the convenience these devices offer comes with a price: insufficient security measures, vulnerabilities, and the risk that your data will be compromised. But don’t be alarmed if there’s already an IoT device in your home – we have some tips on how to best use them safely.

Read More

Page 1 of 62

Powered by WordPress & Theme by Anders Norén