Page 24 - D13906 - LBMAO - Reporter Mag_web
P. 24
complement other content, while script eventually will break a critical so that they can investigate and resolve it
others have opted to use videos as application on your website. Bite the without affecting your business.
backgrounds. This can create a unique bullet and purchase the applications/
and professional website, but it could scripts, but also build a test PROTECTING YOUR BUSINESS FROM
also come off as distracting. Finding environment to make sure everything RANSOMWARE
a middle ground is vital. This is sort works before implementation on your Today, more and more companies are
of like the “next step” of the HD photo live environment. falling victim to ransomware, in which
trend. If it’s done right, using video can 3. Lack of security products, such as alicious code encrypts co puter files, and
have the same, if not stronger, effect on firewall or SS ertifi ate: SSL (Secure cyber attackers demand a ransom to unlock
viewers. Test out a couple of different Sockets Layer) is the standard security them. In 2017, Canada made it in the news
ways to integrate video to see what technology for establishing an several times due to huge cybersecurity
works the best for you. encrypted link between a web server breaches including Carleton University,
5. Infographics - Well-designed and a browser. This link ensures that Equifax, and Bell Canada. In addition,
infographics can convey important all data passed between the web privacy breaches hit a record high in Alberta
data that might be missed otherwise. server and browsers remain private with a Walmart website which potentially
According to 3M Corporation, 90 and integral. If you do not have an exposed the personal information of
percent of information transmitted certificate, a secure connection 109,000 Albertans to an unauthorized third
to the brain is visual, and the brain cannot be established, that means, party.
processes visuals 60,000 times your company information will not be on rofits and s all to ediu si ed
faster than text. Still not convinced? digitally connected to a cryptographic businesses are particularly vulnerable to
Publishers using infographics see their key. If the website is secure it starts ransomware attacks because they often
traffic grow percent ore than with ‘https’ before the website link – so have less sophisticated computer defences.
those that don t n the non profit and be aware of this.
small business sector where statistics 4. Using antiquated technologies (old What exactly is ransomware?
are a great way to raise awareness, versions of ASP or PHP): All new Ranso ware is a specific type of
infographics should be used often. versions of ASP or PHP come with malware that gains control of your system
Don’t stop at your website; use them security improvements, so the older and blocks access or threatens to do harm
for social media, marketing materials, a website version is, the more time to it. Upon infection, a “ransom note” in the
events and anywhere else you think an attacker has which they can take for of a te t file or i age pops up, offering
they could be beneficial advantage of. to restore your system back to normal in
5. mproper ser er setup onfigura exchange for compensation. Many schemes
Websites are more important now tion ecurity isconfiguration often increase the cost of decryption after a
than they ever have been, and they’ll only encompasses several types of couple of days to create a sense of urgency.
continue to grow. The Internet is the go- vulnerabilities all centered on a lack of
to resource for most people, whether they maintenance or a lack of attention to How can I protect my business from
want to get involved or just learn more. the web application configuration ransomware?
Keeping your website looking good and secure configuration ust be defined The best way to defend against
up-to-date can make a huge difference in and deployed for the application, ransomware is taking the time to protect
involvement and awareness related to your frameworks, application server, web yourself fro it in the first place isted
cause. server, database server, and platform. below are some of the best techniques
ecurity isconfiguration gi es hackers to protect your organization from a
TOP 5 SECURITY VULNERABILITIES ON WEB access to private data or features ransomware attack:
DESIGN and can result in a complete system
The moment our world went online, compromise. Backup your data regularly. Modern total
and we started conducting business using data protection solutions, like a business
websites, we became the primary targets In conclusion, it is important to keep continuity/disaster recovery solution, take
for hackers. We’ve put together a list of the your website updated from everything snapshot-based, incremental backups
top 5 website security vulnerabilities that from the theme, to the plugins, to the SSL as frequently as every five minutes to
you should be aware of with your website: certificates it ust all be current to the create a series of recovery points. If your
1. Abandoned website and/or services: If technologies of today. Here at E-Tech, we business suffers a ransomware attack, this
your website is not being updated, have a team of dedicated web developers technology allows you to roll-back your data
it could get easily infected with ready to make sure your website is not to a point-in-time before the corruption
vulnerabilities like SQL Injections or vulnerable, whether you’re looking to have occurred. When it comes to ransomware,
Viruses. A SQL injection is a type of your website redesigned or just a brand-new the benefit of this is two-fold. First, you
web application security vulnerability website we got you covered. don’t need to pay the ransom to get your
in which an attacker attempts to use Another good idea is to do quarterly ransom to get your data back. Second, since
application code to access or corrupt website vulnerability scans (depending on you are restoring to a point-in-time before
database content. If successful, this the size of the website it could be more the ransomware infected your systems, you
allows the attacker to create, read, frequent). This scans your website and can be certain everything is clean, and the
update, alter, or delete data stored in checks for any suspicious activity and any malware cannot be triggered again.
the back-end database. security problems. The moment the scanner
2. Using untested or “hacked” comes across anything suspicious, it raises Use a multi-layered defence
applications/scripts: Applying an the appropriate alerts and brings the issue strategy. Ensure that your business is
untested or “hacked” application/ to the attention of the security experts, protected by both a powerful anti-malware
24 LBMAO Reporter - September-October 2018 www.lbmao.on.ca