Author: Joyce Tammany Page 1 of 3

ransomware

Why Businesses Need To Prevent Ransomware

Ransomware is an attack that can trick you into unnecessarily paying money to cybercriminals while causing you to lose your computer files forever. For businesses, these attacks can also result in a data breach and exposure of sensitive information. Mitigating ransomware is all about preparation and prevention, so we’ll walk you through why this attack occurs, and how you can defend against it.

What is ransomware?

Ransomware happens so frequently that it has a definition in the Oxford English Dictionary: “A type of malicious software designed to block access to a computer system until a sum of money is paid.” Payment is often requested in bitcoin, the popular cryptocurrency, or in gift cards that can easily be sent to a “burner” email address. Unfortunately, if you’re hit by one ransomware attack, you’re likely to be hit again – a survey by Sophos found that not only did 54 percent of respondents experience ransomware, they were likely to experience two attacks or more.

Read More

4th of July

The Beginner’s Guide to California’s Cybersecurity Laws

California has a history of creating legislation that creates a ripple effect that affects consumers in other states. While the laws only affect California, they often push companies into adopting the rules broadly – for example, California’s strict auto emissions standards have been adopted in 16 other states since 2004. “What California does definitely impacts the national conversation,” says state Senator Scott Wiener. As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time. However, these laws have also attracted criticism from tech companies, cybersecurity experts, and the Federal Government. These laws may come to affect you, which is why we’ve created this guide.

Read More

Alexa, Are My IoT Devices Secure?

The internet is everywhere, thanks to the Internet of Things (IoT). The term “Internet of Things” applies to any nonstandard computing device that connects to wifi and can transmit data.  Well-known examples of IoT devices include smart speakers like Amazon Alexa or Google Home, smartwatches like the Apple Watch, internet-connected baby monitors, video doorbells, and even toys.

However, the convenience these devices offer comes with a price: insufficient security measures, vulnerabilities, and the risk that your data will be compromised. But don’t be alarmed if there’s already an IoT device in your home – we have some tips on how to best use them safely.

Read More

what is malware

What Is Malware and How Can It Affect My Website?

Malware is a major cyberthreat that can significantly damage your website or business. How can you keep your website safe when one million new malware threats are created every day? You can easily stay one step ahead of cybercriminals by familiarizing yourself with how malware can affect your site, and what you can do to prevent it.

What is malware?

Malware is software created for malicious purposes. While it is commonly associated with computers, malware can also be used to attack and infect websites.

How malware affects your website

Website malware can…

Read More

ddos protection

What is a DDoS attack?

DDoS attacks are a common cyberthreat that can cost you thousands and take down your website. Even more alarming, they’re incredibly easy for cybercriminals to launch, and can lead to an expensive fallout for unprotected website owners. The good news: DDoS attacks are easily prevented with a web application firewall (WAF).

What is a DDoS attack?

DDoS, short for distributed denial of service, is an attack that makes a site unavailable by overwhelming it with “fake” requests and traffic. This can slow your website or crash the server it is hosted on, which takes down your site as well.

Downtime can be devastatingly expensive for small and medium-sized businesses (SMBs). Website downtime can cost as much as $427 per minute, and DDoS attacks cost an average of $120,000.

DDoS attacks are also favored by cybercriminals because they are extremely inexpensive and can be purchased online for as little as a dollar a minute. Unfortunately, once you’re a target, you’re likely to be attacked again – studies show that two-thirds of all DDoS targets were hit repeatedly.

Read More

SiteLock reviews

Digital Marketing Agency Passes on Important Lesson About Website Security

Company Overview

Radiant Freedom Digital Marketing is a web development and online marketing company that specializes in working with small businesses and startups. Founded in 2014 by Jason Ross, the company assists clients in developing their brand, especially through website design, development, maintenance, and security. Radiant Freedom’s own website is critical to their business. Created by Jason using Drupal 7, radiantfreedom.com showcases the company’s services, educates customers, and generates leads.

Challenge

Just six weeks after the website launched, radiantfreedom.com was suspended by its web host for three days – Jason’s site had been infected with malware.   He was able to remove the malware himself, and used Drupal security modules to prevent future attacks – however, they proved ineffective. Jason knew he had to find another solution, and remembered that one of his clients protected their website with SiteLock.

Read More

website security

The OWASP Top 10: Sensitive Data Exposure

Sensitive data exposure is an all too common cyberthreat that endangers businesses and their customers, as well as websites and their visitors. More frequently known as a data breach, sensitive data exposure ranks as one of the top 10 most dangerous cyberthreats by OWASP (Open Web Application Security Project) because of the damage it can do to its victims.  Fortunately, you can prevent this threat from affecting your website – we’ll discuss how sensitive data exposure occurs and ways to keep your visitors’ information safe.

What is the OWASP Top 10?

The OWASP Top 10 is a list of the ten most dangerous web application security flaws today. Sensitive data exposure currently ranks sixth on this list. The purpose of OWASP and the Top 10 is to drive visibility and evolution in the safety and security of software.

Read More

SMART PLUS

What is website security?

You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective website security. We’ll discuss the basics of website security and what solutions will help ensure your website isn’t taken down by a cyberattack.

What is website security?

Website security is any action or application taken to ensure website data is not exposed to cybercriminals or to prevent exploitation of websites in any way.

Read More

WordPress plugin vulnerability

SiteLock Reviews Best Practices for WordPress Plugin Safety

Thanks to its ease of use and customizability, WordPress is the most popular open source CMS platform in the world. However, the plugins that allow users to easily add features also carry a risk: Sites with 20 or more plugins were nearly three times more likely to have malware. Malware attacks can damage your site’s reputation and cost you money, especially if your site is taken offline or removed from search results. Knowing how to evaluate plugins effectively and use them safely allows you to maintain the functionality of your site without sacrificing security.

Read More

Malware Removal

Blacklisting: Why you want SiteLock reviewing your website before Google does

If you’ve ever visited a website only to be greeted by a red screen warning you about a malware infection, you’ve found a blacklisted site. Search engines do their part to protect users everywhere from malware and cybercrime through a process known as “blacklisting.” While this can be helpful, it is not the most reliable way to look for malware. We’ll discuss what blacklisting does and does not do, as well as the most effective ways to know if a website is infected with malware.

Read More

Page 1 of 3

Powered by WordPress & Theme by Anders Norén