Category: SiteLock News Page 2 of 10

SiteLock’s Top Five Cybersecurity Predictions For 2020

It’s safe to say that the volume and magnitude of high-profile data breaches and ransomware attacks that punctuated 2019 really kept the cybersecurity industry on its toes. Data breaches stole numerous headlines this year, including the notable Capital One breach that exposed more than 100 million customers’ accounts. In fact, New Orleans even declared a state of emergency due to the large number of public services that were directly impacted by this ransomware attack. In comparison to last year, research shows that data breaches have increased by 54% — making 2019 “the worst year on record” for data breaches. 

According to SiteLock researchers and cybersecurity experts, the threat landscape will only continue to grow in 2020 and will likely bring even more new challenges with it. We’ve analyzed the current state of the industry and packaged up our top five cybersecurity predictions for 2020.

Read More

SiteLock INFINITY Wins the 2019 Cloud Security Excellence Award

We are excited to announce that SiteLock® INFINITY™ has been recognized as a WINNER of the 2019 Cloud Computing Security Excellence Awards! The Cloud Computing Security Excellence Awards, presented by TMC’s Cloud Computing Magazine, honor solutions in two categories: solutions that most effectively leverage cloud platforms to deliver network security, and those providing security for cloud applications.

Read More

What Is Malvertising and How Do You Prevent It?

Did you know that a malicious advertisement could look exactly the same as a legitimate one?

Malware is constantly changing as cybercriminals look for new methods to wreak havoc on website owners and visitors. One of their main tactics is malvertising — tricking visitors into downloading malware disguised as online ads — which can cause problems for both your business and customers. Cybercriminals carry out malvertising cyberattacks in two ways: They either inject malicious code into legitimate digital ads, or they create fake ads and distribute them through ad networks.

It’s easy for an end-user to fall victim to a malvertising attack. Because these devious ads have the same look and feel as legitimate ones, the illicit ads can slip by security checks during the approval process. Once someone clicks the infected ad, it starts a malicious download process and ultimately infects the user’s computer.

Read More

Where do the 2020 Candidates Stand on Cybersecurity Awareness?

The ugly news about Russian interference in the U.S. presidential election forced the issue of cybersecurity into the political spotlight in 2016. Since this catalytic event, political leaders have grappled with cybersecurity awareness on a global stage — and not all have done so gracefully.

Bad actors, whether politically motivated or not, grow increasingly sophisticated as our world becomes more rooted in technology. However, it appears lawmakers aren’t prepared for this reality. One example: too many are in the dark about website encryption — 61% of world politicians’ websites aren’t HTTPS-secured.

Read More

5 Steps to Building a Foolproof Cybersecurity Incident Response Plan

No matter what industry you’re in, there’s a good chance that you conduct a lot of your business online. Most modern small businesses have one or more digital properties, including a website and various social media pages. Your website may or may not be your chief sales portal, but it’s usually the first place prospective customers go to learn about your brand, making it a vital asset.

Read More

Spyware in the IoT – the Biggest Privacy Threat This Year

Technology. It’s designed to make our homes more comfortable and workplaces more efficient. 

But, every advancement towards realizing a 21st century quality of life comes with a wave of security threats, old and new. The consequences of which are not only born by companies who are the primary targets of cybercrime. Your home systems are more vulnerable than you think.

Read More

Protect Customer Data with the Enhanced SMART Database Scanner

30% of all malware cleaned by SiteLock’s Expert Services is located inside website databases. With databases housing critical customer data like emails, addresses, and other personal information, we knew we needed to develop a comprehensive solution to keep companies secure. That’s why we launched SMART® Database (SMART/DB™) two years ago, automatically detecting spam or malware found within critical WordPress database tables.

We are excited to announce we are taking database security a step further. 

Read More

These 3 Automated Cybersecurity Tools Will Save You Time and Money

As cyberattacks become increasingly automated, website owners must come to the realization that it might be time to fight fire with fire. Manual detection and removal is becoming increasingly unrealistic — even with the most highly skilled team of cybersecurity specialists at your disposal. 

Implementing automated cybersecurity tools is the best way to not only prevent cybersecurity attacks but also reduce the time it takes to identify and contain successful ones — which is a major determinant of the overall cost of a cyberattack. Downtime from a cyberattack can cost small businesses as much as $427 per minute. Automated cybersecurity tools can notify you of an attack as soon as it occurs so you can spring into action.

Read More

The Ultimate Incident Response Plan Checklist

How do you resolve a cyberattack as quickly and completely as possible? A cyber incident response plan is designed to answer that question. The plan kicks in immediately after an attack and outlines exactly how your company will use its resources to minimize the damage and overcome the incident. In as much detail as possible, it describes who will be involved, what individuals’ roles will be, and which procedures they will need to follow.

Read More

How You Should Respond Internally to IT Security Incidents

In a single day, websites experience, on average, nearly 60 cyberattacks. And for small businesses, successful attacks can have a lasting impact: 60% of small businesses will go out of business following a successful breach due to the costs of recovery.

In this article, we’ll talk about IT security incidents, which are events that indicate an organization’s systems or data have been compromised or that existing cybersecurity measures have failed. The key to staying afloat during an IT security incident is preparation — and effective communication is a major component in that. Knowing how to communicate transparently, both internally and externally, in the wake of an attack not only builds trust with your employees but also helps protect your reputation.

Read More

Page 2 of 10