Search results: "security insider"

malware

Patchman Now Protecting Ecommerce Sites

Patchman, best known for patching application vulnerabilities and helping hosts stop abuse before it begins, is expanding its product offering for the first time since being acquired by SiteLock in July 2017.  Patchman, which is based in the Netherlands, was founded in 2015 with the goal of securing CMS applications from the hosting provider level to protect customers who did not update their applications in a timely manner. Up until now, Patchman has focused on the “Big Three” of open source content management systems – WordPress, Joomla!, and Drupal – covering core application vulnerability patches. Now, for the first time, Patchman is expanding their offerings into both ecommerce and plugins – offering patches for Magento core vulnerabilities and WooCommerce vulnerabilities.

Read More

Introducing SiteLock SMART PLUS

The only solution in the industry to offer file-based malware scanning and automatic core security patching for WordPress, Joomla! and Drupal, in addition to database scanning for WordPress websites has arrived! Introducing SMART PLUS!

Read More

holiday shopping online

Why Your Customers Fear Online Shopping

Ecommerce sites can look forward to overstuffed stockings this holiday season. Holiday sales are expected to increase by at least 4 percent this year, for an anticipated total of $1.04 trillion – and for the first time, online spending is expected to exceed in-store sales. In fact, consumers plan to spend 51 percent of their holiday shopping budget online, compared to 42 percent in stores.

Despite these trends, a recent study by SiteLock shows that nearly one in three online shoppers do not plan to shop online at all during the holidays.

Read More

Post Status Publish 2016: A Philadelphia Prelude

Last week SiteLock deployed en masse eight members of our team to Philadelphia to begin preparations for the upcoming WordCamp US 2016 as both a sponsor and a thought leader for security in the WordPress community. This year the day before #WCUS was very special, not only because we got to flex our muscles hauling and setting up sponsor booth equipment, but because for the first time ever, Post Status organized the one-day conference Publish. The event focused on WordPress professionals was hosted within walking distance of the WCUS venue in Commerce Square at the heart of Philadelphia.

Read More

Data breaches

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

OTA’s 2015 Data Protection and Breach Readiness Guide

The Online Trust Alliance (OTA) recently released its 2015 Data Protection and Breach Readiness Guide for its seventh consecutive year. This guide helps provide businesses with prescriptive advice to help optimize data privacy and security practices to prevent, detect, contain and remediate the risk and impact of data loss incidents and breaches.

Read More

How To Prevent Business Identity Theft

business identity theftIdentity theft is the fastest growing crime in the history of America, and businesses are not immune. There were more than 16 million victims of identity theft in the U.S. just last year, which works out to more than one new victim every three seconds. To put that in perspective, that means there were more victims of identity theft last year than there were reported murders, attempted murders, burglaries, attempted burglaries, arsons, vehicle thefts, purse snatchings, pick pocketings, shoplifting, and check fraud combined. With so many crimes and criminals in circulation, don’t make the mistake of assuming that it will never come creeping into your business.

Read More

10 Takeaways From The 2014 Verizon Breach Report

2014 verizon data breach reportEvery year about this time, Verizon comes out with an annual review of the results of its investigations into thousands of data breaches and security incidents from around the world.

The report can be very data heavy and even a little depressing, but we can learn great things from it. Here are just ten:

Read More

Don’t Let Your Employees Become The Enemy

top8Of all the threats that could be stalking your business daily, it is most unpleasant to think about the fact that the biggest threat could already be inside your walls, maybe even on your payroll. Unfortunately there’s plenty of evidence to suggest that the biggest source and cause of security incidents is the humble employee.

The good news is that few of these incidents are deliberate attacks or frauds by your most trusted insiders. Instead they tend to be innocent mistakes which could easily be avoided but which are quickly taken advantage of by hackers.

Read More

12 Simple Steps to Data Protection

Did you know that there has been an average of more than one reported data breach in the U.S. every single day for each of the last five years? And that’s only the reported data breaches. The number of unreported or undiscovered data breaches could be ten times, even one hundred times that number.
Those data breaches combined have exposed more than 4.2 billion records, and some studies have found that more than 80% of those breached records have included Social Security numbers.

Read More

Page 5 of 5