Website Security – Safety First!
None of us really want to think about the possibility of our website or blog site or even online store being attacked or hacked! It’s like having to think about getting held at gun point or hijacked! We know the danger is out there but it’s just never going to happen to us … right?! Truth is, we MUST consider that our businesses or private accounts may be breached.
On average there is some kind of online hack or attack taking place every 40 seconds!
Think about all the time, effort and money that have gone into your online presence! Do you really want to put all that at risk with bad security?! NO!!!
It is easy to see if a website has a reputable firewall, simply use SiteCheck. It is a free website security check and malware scanner. Also, when choosing your web host make sure to discuss the security they offer so you may have peace of mind!
In this article we look at some of the security risks you should be aware of.
Cyber Attacks and Malware
Let’s define CYBER ATTACKS and MALWARE
Cyber criminals may launch a cyber attack in order to maliciously disable a computer or network. They do this to steal data or use a breached computer/network to launch more attacks. Attacks may include phishing scams, identity theft or cyber stalking and online harassment. There are several agencies around the world that make it their business to investigate cyber crime.
Cyber criminals use malware – malicious software – to attack a computer/network. It is coded language specifically developed to gain unauthorized access to systems, by plant viruses, ransomware and spyware. It causes extensive damage to data and systems. There are different classifications of malware and each need to be contained and removed differently.
Usernames and Passwords
We all use it. Some of us have a hard time remembering all our many usernames and passwords! We need it for the many different electronic gadgets, accounts and online platforms we use!
What is the purpose of Usernames and Passwords really?
- It protects your data
- It verifies your identity
The combination of usernames and passwords is generally referred to as LOGIN. Most systems will give you a guideline of how to create a strong password. Sometimes ease-of-use is favored over good security. NO! Always aim to think out the box when creating your own unique password. And NEVER share it with anyone!
Firewalls protect your systems – computers, networks – from unauthorised external access. It is generally installed at the first entry point or port into your system. It identifies and reports suspicious sources. Firewalls are available as both hardware and software options.
Firewall software is in the form of a program installed on each computer. Firewall hardware is actual physical equipment normally installed between your network and gateway.
Discuss the options available to you with your web hosting company to make sure you are covered.
This is often the most overlooked and understated security process in the age of technology! Most small business owners think that they don’t have enough data to have to worry about back-up processes. But you can’t be more wrong! No matter how little data you think you may have, losing it is simply not an option. Time, effort and money probably went into every piece of data you have. Having to start over would waste time and money!
There are different types of back-up processes:
- full back-up,
- incremental back-up
- differential back-up
- synthetic back-up
- mirror back-up, and
- cloud back-up
Before choosing a web host, find out what their BACK-UP POLICY is. Don’t just assume you are covered, that is simply too dangerous.
Security Software should offer you:
- Data protection,
- Identity protection and
- Privacy protection
It is generally affordable and easy to use. Innovative solutions that keep up with new security trends will give you peace of mind.
Correction should all be part of the package.
There many different security software products available depending on your unique needs.
Do not assume that your web host has security covered. There are some security protocols your web hosting company will automatically have in place to protect their own systems. Sometimes security protocols will be a joint responsibility. In other instances you may be solely responsibility for your web or blog site security or your online store. When in doubt, ASK!
If you have any questions about your current security set up please ask OpenHost, we are happy to help!