Author: Lauren Papagalos Page 15 of 26

Cybersecurity Report: June 23, 2015

Cybersecurity Pros Warn Against Insider Threats

cybersecurity reportA recently released Insider Threat Report collected data from over 500 cybersecurity professionals to examine industrial efforts against insider threats. According to the report, although there has been a rise of insider threats over the last 12 months, organizations are not fully prepared for it yet. The report also examined which user categories showed the largest threat, the most vulnerable applications and data, common launch points for attacks, budget trends and more.

Read More

Cybersecurity Report: June 16, 2015

Senate Rejects Measure to Strengthen Cybersecurity

Cybersecurity reportSeveral days after a major breach of the personal information of federal employees, the Senate rejected a cyber security measure on Thursday. The rejected bill would encourage private 5companies to voluntarily share information about hack attacks with the federal government to prevent future data breaches. The vote was 56-40, four votes short of the 60 needed to move ahead on the legislation. Many Democrats voted against the bill, mainly because it was tacked to a sweeping defense bill, which many Democrats oppose and President Obama has threatened to veto.

Read More

How to Secure Your Open Source Platform Website

WordPress vulnerabilities

Open source content management systems (CMS) like WordPress, Joomla! and Drupal have become some of the most popular platforms for creating websites. So much in fact, that over 25 percent of the entire internet is powered on WordPress.

Platforms like WordPress are free and have a huge community of users and developers, providing a vast ecosystem themes and plugins. Unfortunately, since they’re so popular, open source platforms are often a large target for hackers and since much of the platform is developed by volunteers, code vulnerabilities may exist.

Read More

Surviving a Data Breach

How to Survive a Data Breach

Neill Feather, SiteLock presidentData breaches are fairly common occurrences these days – in 2014 alone, nearly half (43%) of all companies experienced a cyber attack. Even worse is that most data breaches take weeks or even months to discover, which can have devastating effects on a business since the average cost of a compromised record is worth more than $194.

What can businesses do to prepare for and mitigate the inevitable cyber attack? Check out what Neill Feather, president of SiteLock, recently wrote in an article on Smart Data Collective to help businesses put the proper recovery and response plans in place.

 

SiteLock Website Security

Must-Know Privacy and Security Compliances

With cyberattacks and data breaches on the rise, privacy and security compliances are more important than ever. What are compliances you ask? Generally, they’re laws designed to protect private consumer and company data from being stolen and exposed.

Privacy and security compliances span across many industries – education, government, health and technology, like cloud and SaaS. You may have even heard of a few of them, like HIPAA or SOC.

Govloop

Neill Feather, president of SiteLock, recently wrote an article highlighting the top 3 privacy and security compliances that you should know, along with some tips to help organizations improve website compliance.

Read Neill Feather’s Govloop article for more information. If you have any questions about how to secure your website, give SiteLock a call at 855.378.6200. We are available 24/7/365 to help.

 

Five Common Website Security Issues

five common website security issues

Websites and web applications are being hacked more than ever these days (especially with the rise of online businesses and B2B SaaS-based platforms). If a hacker gains access to the system, they can compromise financial records, medical records and other personal information such as Social Security Numbers and credit cards.

SiteLock president Neill Feather recently wrote an article on B2BNN, covering 5 security issues that many websites and web applications face, with solutions, including handling payments  (PCI compliance), malware and password enforcement. For the full article, click here.

PGP encryption

A Guide To PGP Encryption

We teach our kids not to share anything on the internet that they wouldn’t want their grandmothers to see. We tell our employees to be mindful of private information shared via email. But are we really doing all we can to protect this method of conversation?

Cybersecurity And Your Emails

There are over 204 million emails sent each minute, yet email is one of the most overlooked technologies when it comes to cyber security. A recent study by Domo showed more than 53% of employees receive unencrypted and risky corporate data through email or an attachment. How can we help ensure that the information we’re interacting with is secure?

What Is PGP Encryption?

PGP, which stands for Pretty Good Privacy, is a great first step. PGP works by encrypting email between two people who each have unique digital fingerprints known as PGP keys.

Read More

SiteLock Sponsors WHD.usa 2015

WHD.usa (WorldHostingDay USA) is an upcoming networking event for the hosting and cloud service markets, bringing together local service providers and international IT companies. WHD.usa will be WHD’s first event in the United States, and is taking place on May 19-20, 2015 at the 7Springs Ski & Mountain Resort in Pennsylvania.

Read More

OTA Receives SC Magazine Editor’s Choice Award

SC magazine editor's choice awardOTA (The Online Trust Alliance) was awarded SC Magazine’s Editor’s Choice award earlier this week, thanks to the input from SC Magazine’s editors and over 40,000 readers. SC Magazine chose to award the OTA based on its efforts to improve SSL best practices, botnet frameworks, integrity in email and data breach readiness.

OTA was also cited for its work in public policy and success in convening multi-stakeholder efforts.

Read More

5 Must-Read Cybersecurity Websites

Cyber MondayThere’s no doubt that cybersecurity is on the rise. As the world continues to experience data breaches, more and more of these stories have been filling headlines.

With so much cybersecurity overage, it can be difficult to sort through the noise and identify the most important stories. That said, we’ve put together a list of the top five must-read websites that you should add to your daily reading list:

Read More

Page 15 of 26

Powered by WordPress & Theme by Anders Norén