Page 60 of 62

10 Steps to Business Cybersecurity

cybersecurityEven just thinking about protecting your business from all the cyber threats it faces can be daunting. Where do you begin? Do you start with your website, or is it something more basic like having a security plan? Do you train your employees or lock down every computer and let technology do the work? If critical data has to be protected, which data first? Which data most?

It’s this very scenario that creates the biggest security vulnerability for most small businesses. When building an effective security program for your business begins to look like a much bigger mountain to climb, especially as you get closer, you put the project off until another day. And in the meantime, hackers can have a field day.

Read More

To WAF or Not to WAF? Part 3: Types of Website Traffic

Who is visiting my website?

There are two basic categories of traffic that visit your website – humans and bots. An invaluable benefit of the TrueShield web application firewall is being able to differentiate, not only between these two basic groups, but also to separate the good bots from the bad. Bots get a bad rap, since most people associate them with cyber attacks. But if it weren’t for the search engines using bots to index your website, your site would never appear in a search and all your SEO efforts would be wasted. These are the good bots, and if your website application firewall is blocking them you could be hurting your online business instead of protecting it. SiteLock ensures that these bots are able to access your site and do their job for you. Knowing more about your visitors also enables you to spend smarter when it comes to marketing dollars, and to provide your advertisers with the most accurate numbers.  When it comes to your website traffic (and, well, pretty much everything else in life), knowledge is power.

Read More

Don’t Let a Trojan Virus Disrupt Your Business

If you’re like most small business owners, you probably don’t believe that something as small as a piece of malware could threaten your business. After all, what could you possibly have that malware could want? And why would a hacker pick on you when they have so many bigger fish to go after?

Maybe this story will change your mind. A very small, nine-person business in southern California recently announced that it would have to close down suddenly and permanently after a small piece of malware known as a banking Trojan managed to slip on to the computer of one of its employees.

Read More

To WAF or Not to WAF? Part 2: Introducing TrueShield

What is TrueShield?

TrueShield is SiteLock’s WAF (web application firewall.) It operates like your very own team of secret service agents, standing guard at every possible entry point on your website, 24/7. The TrueShield web application firewall inspects every visitor who tries to enter your site, denying access to the bad guys and bad bots, and welcoming the rest. You may imagine this would cause a traffic jam and slow down flow to your website – but it is actually just the opposite. The TrueShield WAF includes TrueSpeed, a content delivery network (CDN) which moves your website into the fast lane, loading your pages faster and improving your visitors’ experience – even boosting your SEO. It’s pretty remarkable stuff.

Who can use TrueShield?

Anyone who has a website. The TrueShield web application firewall is cloud-based, which means that it doesn’t require a complicated installation – in fact setup takes just a few minutes. It also means that TrueShield is affordable for even the smallest businesses and budgets. A typical small to mid-sized business does not have the in-house technical staff, nor the time, to deal with the complexities of protecting their site from every potential attacker. A web application firewall, like TrueShield, is the easiest way for a small business to get enterprise-grade protection without needing enterprise-level resources.

To get more information about TrueShield or to learn about other great products to protect your website visit www.sitelock.com today.

Keys to Computer Security

Computer SecurityMany years ago, a bar owner shared with me the tale of how he was losing so much money in one of his bars he had to hire a loss prevention specialist to pose as a customer and watch his staff for any signs of financial impropriety.

The undercover customer spent nearly a month visiting the bar (what a job!) and reported back that he found nothing was amiss. He said he watched all the cash registers for four weeks and didn’t see one suspicious transaction at any one of the four registers.

Read More

How to Protect My Website from Cybercrime

In a recent interview with Barry Moltz on Blog Talk Radio, Neill Feather, President of SiteLock, responds to the growing concern, particularly for small businesses, of website risks and how adding website security can protect online businesses and their reputation.

cybercrime

Protect your website from hackers and cybercrime.

The fact is that small businesses are increasingly a prime target for cyber crime. Case in point – Neill references a recent study by Verizon that states that 95% of online businesses that are attacked by hackers have fewer than 100 employees. And the number of attacks continues to grow each day.

Read More

Building a Cybersecurity Plan

Ever heard the saying “if you fail to plan then you plan to fail”? This is just as true in security as it is in business, and the lack of a clear plan to protect your business from cyber risks usually results in no real protection at all.

An information or cyber security plan is a very simple and free tool that can have a profound impact on how well your business is protected from cyber threats. A security plan is a short document, often no longer that a few pages, that outlines:

Read More

eCommerce Website Security

PCI Compliance – Embrace it, before it cashes you out

pci complianceAs a small businesses owner who accepts credit cards online, becoming PCI compliant is one of the most important decisions you can make.

There are millions of small business merchants in the U.S., and while every small business that accepts credit cards has to comply with Payment Card Industry Data Security Standard (PCI DSS), many businesses do not.

Read More

To WAF or Not to WAF?

The Open Web Application Security Project (OWASP) was formed with the goal of supporting the creation, development, acquisition, operation and maintenance of applications that can be trusted by their users.

Web Application Firewall (WAF)

As more applications are developed online, the threats to attack those applications increase even more rapidly in the form of threat agents. The agents, in this case, are not often the good guys (even though sometimes they are employees or others within your organization). They are any capability, intention or activity that attempts to exploit the company’s assets, frequently its data.

Read More

Fear of the Walking Botnet

BotnetsWith all the movies and TV series focused on zombies lately, many of us seem to have zombies on the brain. Think they don’t actually exist? Oh but they do – in the form of business and personal computers compromised with malicious software capable of engaging all kinds of nasty behavior.

Networks of zombie computers are called botnets, and many experts believe that botnets now represent the single biggest cyber threat, to businesses and to consumers:

Read More

Page 60 of 62

Powered by WordPress & Theme by Anders Norén