California has a history of creating legislation that creates a ripple effect that affects consumers in other states. While the laws only affect California, they often push companies into adopting the rules broadly – for example, California’s strict auto emissions standards have been adopted in 16 other states since 2004. “What California does definitely impacts the national conversation,” says state Senator Scott Wiener. As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time. However, these laws have also attracted criticism from tech companies, cybersecurity experts, and the Federal Government. These laws may come to affect you, which is why we’ve created this guide.
Page 2 of 62
This year has been quite the whirlwind of travel for me in my role as Community Evangelist here at SiteLock! It’s taken me from one end of the country to the other as a sponsor, speaker, and attendee, and every moment has been a blast. I’ve really enjoyed visiting so many different towns and WordPress communities. On Saturday, November 5, it was time to welcome people to my own town for WordCamp Portland 2018.
As co-Lead Organizer of WordCamp Portland, I was involved in all aspects of the event this year and we started planning all the way back in May! But on Saturday everything finally came together for one of our most successful WordCamps yet.
The internet is everywhere, thanks to the Internet of Things (IoT). The term “Internet of Things” applies to any nonstandard computing device that connects to wifi and can transmit data. Well-known examples of IoT devices include smart speakers like Amazon Alexa or Google Home, smartwatches like the Apple Watch, internet-connected baby monitors, video doorbells, and even toys.
However, the convenience these devices offer comes with a price: insufficient security measures, vulnerabilities, and the risk that your data will be compromised. But don’t be alarmed if there’s already an IoT device in your home – we have some tips on how to best use them safely.
Founded in 2003, Rochelle Interiors is a full-service interior design consultation business offering decorating, space planning, remodeling, and updating for clients’ homes. Founder Rochelle Mella believes in providing graceful aesthetics with functional design to meet the needs of individual budgets. Through rochelleinteriors.com, prospective and current customers can review services offered, view images of before and after projects, and submit a quick inquiry.
Malware is a major cyberthreat that can significantly damage your website or business. How can you keep your website safe when one million new malware threats are created every day? You can easily stay one step ahead of cybercriminals by familiarizing yourself with how malware can affect your site, and what you can do to prevent it.
What is malware?
Malware is software created for malicious purposes. While it is commonly associated with computers, malware can also be used to attack and infect websites.
How malware affects your website
Website malware can…
DDoS attacks are a common cyberthreat that can cost you thousands and take down your website. Even more alarming, they’re incredibly easy for cybercriminals to launch, and can lead to an expensive fallout for unprotected website owners. The good news: DDoS attacks are easily prevented with a web application firewall (WAF).
What is a DDoS attack?
DDoS, short for distributed denial of service, is an attack that makes a site unavailable by overwhelming it with “fake” requests and traffic. This can slow your website or crash the server it is hosted on, which takes down your site as well.
Downtime can be devastatingly expensive for small and medium-sized businesses (SMBs). Website downtime can cost as much as $427 per minute, and DDoS attacks cost an average of $120,000.
DDoS attacks are also favored by cybercriminals because they are extremely inexpensive and can be purchased online for as little as a dollar a minute. Unfortunately, once you’re a target, you’re likely to be attacked again – studies show that two-thirds of all DDoS targets were hit repeatedly.
Radiant Freedom Digital Marketing is a web development and online marketing company that specializes in working with small businesses and startups. Founded in 2014 by Jason Ross, the company assists clients in developing their brand, especially through website design, development, maintenance, and security. Radiant Freedom’s own website is critical to their business. Created by Jason using Drupal 7, radiantfreedom.com showcases the company’s services, educates customers, and generates leads.
Just six weeks after the website launched, radiantfreedom.com was suspended by its web host for three days – Jason’s site had been infected with malware. He was able to remove the malware himself, and used Drupal security modules to prevent future attacks – however, they proved ineffective. Jason knew he had to find another solution, and remembered that one of his clients protected their website with SiteLock.
Last week, Joomla! released version 3.8.13 which included five security updates for the 3.x series of Joomla!. All five of the vulnerabilities addressed are part of the Joomla! application core. Although all of the vulnerabilities are considered low priority, Joomla! is encouraging users to update their applications as soon as possible to avoid possible compromise as a result of them being exploited. The vulnerabilities below were addressed:
Sensitive data exposure is an all too common cyberthreat that endangers businesses and their customers, as well as websites and their visitors. More frequently known as a data breach, sensitive data exposure ranks as one of the top 10 most dangerous cyberthreats by OWASP (Open Web Application Security Project) because of the damage it can do to its victims. Fortunately, you can prevent this threat from affecting your website – we’ll discuss how sensitive data exposure occurs and ways to keep your visitors’ information safe.
What is the OWASP Top 10?
The OWASP Top 10 is a list of the ten most dangerous web application security flaws today. Sensitive data exposure currently ranks sixth on this list. The purpose of OWASP and the Top 10 is to drive visibility and evolution in the safety and security of software.
You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective website security. We’ll discuss the basics of website security and what solutions will help ensure your website isn’t taken down by a cyberattack.
What is website security?
Website security is any action or application taken to ensure website data is not exposed to cybercriminals or to prevent exploitation of websites in any way.