Page 24 - D13906 - LBMAO - Reporter Mag_web
P. 24

complement  other  content,  while   script  eventually  will  break  a  critical   so that they can investigate and resolve it
                others  have  opted  to  use  videos  as   application  on  your  website.  Bite  the   without affecting your business.
                backgrounds. This can create a unique   bullet  and  purchase  the  applications/
                and professional website, but it could   scripts,  but  also  build  a  test  PROTECTING  YOUR  BUSINESS  FROM
                also  come  off  as  distracting.  Finding   environment  to  make  sure  everything   RANSOMWARE
                a  middle  ground  is  vital.    This  is  sort   works  before  implementation  on  your   Today,  more  and  more  companies  are
                of like the “next step” of the HD photo   live environment.           falling  victim  to  ransomware,  in  which
                trend. If it’s done right, using video can   3.  Lack of security products, such as    alicious code encrypts co puter files, and
                have the same, if not stronger, effect on   firewall  or  SS    ertifi ate:  SSL  (Secure   cyber attackers demand a ransom to unlock
                viewers. Test out a couple of different   Sockets Layer) is the standard security   them. In 2017, Canada made it in the news
                ways to integrate  video to  see what   technology  for  establishing  an  several  times  due  to  huge  cybersecurity
                works the best for you.              encrypted  link  between  a  web  server   breaches  including  Carleton  University,
            5.  Infographics  -     Well-designed    and  a  browser.  This  link  ensures  that   Equifax,  and  Bell  Canada.  In  addition,
                infographics  can  convey  important   all  data  passed  between  the  web   privacy breaches hit a record high in Alberta
                data  that  might  be  missed  otherwise.   server  and  browsers  remain  private   with  a  Walmart  website  which  potentially
                According  to  3M  Corporation,  90   and  integral.  If  you  do  not  have  an   exposed  the  personal  information  of
                percent  of  information  transmitted        certificate,  a  secure  connection   109,000 Albertans to an unauthorized third
                to  the  brain  is  visual,  and  the  brain   cannot  be  established,  that  means,   party.
                processes  visuals  60,000  times    your company information will not be    on  rofits and s all to  ediu  si ed
                faster  than  text.  Still  not  convinced?   digitally connected to a cryptographic   businesses  are  particularly  vulnerable  to
                Publishers using infographics see their   key.  If  the  website  is  secure  it  starts   ransomware  attacks  because  they  often
                traffic  grow      percent   ore  than   with ‘https’ before the website link – so   have less sophisticated computer defences.
                those that don t    n the non profit and   be aware of this.
                small  business  sector  where  statistics   4.  Using antiquated technologies (old   What exactly is ransomware?
                are  a  great  way  to  raise  awareness,   versions of ASP or PHP):  All  new   Ranso ware  is  a  specific  type  of
                infographics  should  be  used  often.   versions  of  ASP  or  PHP  come  with   malware that gains control of your system
                Don’t  stop  at  your  website;  use  them   security  improvements,  so  the  older   and blocks access or threatens to do harm
                for  social  media,  marketing  materials,   a  website  version  is,  the  more  time   to it. Upon infection, a “ransom note” in the
                events  and  anywhere  else  you  think   an  attacker  has  which  they  can  take   for  of a te t file or i age pops up, offering
                they could be beneficial             advantage of.                    to  restore  your  system  back  to  normal  in
                                                 5.   mproper   ser er   setup  onfigura   exchange for compensation. Many schemes
               Websites  are  more  important  now   tion     ecurity    isconfiguration   often increase the cost of decryption after a
            than  they  ever  have  been,  and  they’ll  only   encompasses  several  types  of  couple of days to create a sense of urgency.
            continue  to  grow.  The  Internet  is  the  go-  vulnerabilities all centered on a lack of
            to resource for most people, whether they   maintenance or a lack of attention to   How can I protect my business from
            want  to  get  involved  or  just  learn  more.   the  web  application  configuration       ransomware?
            Keeping  your  website  looking  good  and   secure  configuration   ust  be  defined   The  best  way  to  defend  against
            up-to-date  can  make  a  huge  difference  in   and  deployed  for  the  application,   ransomware  is  taking  the  time  to  protect
            involvement and awareness related to your   frameworks,  application  server,  web   yourself  fro   it  in  the  first  place    isted
            cause.                                   server,  database  server,  and  platform.   below  are  some  of  the  best  techniques
                                                      ecurity  isconfiguration gi es hackers   to  protect  your  organization  from  a
            TOP 5 SECURITY VULNERABILITIES ON WEB    access  to  private  data  or  features   ransomware attack:
            DESIGN                                   and  can  result  in  a  complete  system
               The  moment  our  world  went  online,   compromise.                   Backup your data regularly.  Modern total
            and  we  started  conducting  business  using                             data  protection  solutions,  like  a  business
            websites,  we  became  the  primary  targets   In  conclusion,  it  is  important  to  keep   continuity/disaster  recovery  solution,  take
            for hackers. We’ve put together a list of the   your  website  updated  from  everything   snapshot-based,  incremental  backups
            top 5 website security vulnerabilities that   from the theme, to the plugins, to the SSL   as  frequently  as  every  five  minutes  to
            you should be aware of with your website:  certificates     it   ust  all  be  current  to  the   create  a  series  of  recovery  points.  If  your
            1.  Abandoned website and/or services: If   technologies  of  today.  Here  at  E-Tech,  we   business suffers a ransomware attack, this
                your  website  is  not  being  updated,   have  a  team  of  dedicated  web  developers   technology allows you to roll-back your data
                it  could  get  easily  infected  with   ready  to  make  sure  your  website  is  not   to  a  point-in-time  before  the  corruption
                vulnerabilities  like  SQL  Injections  or   vulnerable, whether you’re looking to have   occurred.  When  it  comes  to  ransomware,
                Viruses.  A  SQL  injection  is  a  type  of   your website redesigned or just a brand-new   the  benefit  of  this  is  two-fold.  First,  you
                web application  security  vulnerability   website we got you covered.  don’t need to pay the ransom to get your
                in which an attacker attempts to use   Another good idea is to do quarterly   ransom to get your data back. Second, since
                application  code  to  access  or  corrupt   website  vulnerability  scans  (depending  on   you are restoring to a point-in-time before
                database  content.  If  successful,  this   the  size  of  the  website  it  could  be  more   the ransomware infected your systems, you
                allows  the  attacker  to  create,  read,   frequent). This scans  your  website  and   can be certain everything is clean, and the
                update,  alter,  or  delete  data  stored  in   checks  for  any  suspicious  activity  and  any   malware cannot be triggered again.
                the back-end database.           security problems. The moment the scanner
            2.  Using   untested  or    “hacked”  comes across anything suspicious, it raises   Use  a  multi-layered  defence
                applications/scripts:   Applying  an  the appropriate alerts and brings the issue   strategy.  Ensure  that  your  business  is
                untested  or  “hacked”  application/  to  the  attention  of  the  security  experts,   protected by both a powerful anti-malware

            24  LBMAO Reporter - September-October 2018                                                  www.lbmao.on.ca
   19   20   21   22   23   24   25   26   27   28