IT
There are a variety of ways that cyber criminals can gain access to a website and its data. They often target the various types of software that a site uses to run, from web servers and content management systems such as WordPress, to database servers and their operating systems. Web hosting providers can also be the victim of attack, with a successful breach giving the hacker access to all the websites they host. Brute force password attacks may also be used.
Green continues: “Shockingly, it is also not uncommon for organisations to unknowingly have entire customer databases exposed to the internet – so sometimes a hacker doesn’t have to work hard at all to gain access to sensitive information. We offer businesses can a free initial report of their internet facing assets using our FoxTech CyberRisk assessment tool.” Most businesses can make vast improvement just by implementing a few simple security strategies. Green says that his top five tips to hack-proof a website are:
Always install software updates: A common method that hackers use to gain access to a website, is exploiting vulnerabilities in the software a site uses to stay up and running. Software companies frequently scan for weaknesses in their system, and create fixes, which are rolled out to users via software updates. By always installing these updates promptly, website owners can ensure that their site won’t be exploited by hackers targeting those using old software with unpatched vulnerabilities. Updates need to be installed across all the software, including security plugins, web servers, and CMSs. Enable two-factor authentication: Enabling two-factor authentication (2FA) on the site means that even if a hacker has gained access to passwords, they will not be able to
log in without inputting a code sent to the device linked to that account. This is one of the simplest and most cost-effective ways to protect any accounts associated with a site from becoming the victim of a data breach. On a WordPress site, popular 2FA tools include SecSign, and the Google Authenticator plugin. Businesses can also strengthen their protection against password attacks by following the National Cyber Security Centre’s guidance on updating password policies.
Ensure security products are correctly configured: Security products, such as anti- virus software and firewalls, are designed to scan for, and block, hacking attempts. However, any security product needs to be correctly configured and monitored, otherwise
they will not deliver the full protection expected. Businesses without the in-house capacity to carry out these tasks can be reassured that hiring a third-party cyber security consultancy to properly configure any products should come at a relatively low cost. Be picky about your host server: It might be tempting to use a cheap host, however, the low price comes at a cost. These providers often have glaring holes in their security measures which makes them, and the websites they host, vulnerable to attack. While trusted web hosts do come with a higher price tag, they offer strong server security. It’s important to have real-time scanning and monitoring and immediate alerts if problems are spotted. Create regular backups: If security measures are not up to scratch, creating regular backups won’t prevent a hacker from gaining initial access to a site. However, it does mean site owners have the power to cut them off at the source. When armed with a recent backup of the site, all that is needed in the event of a breach is delete the hacked site, and reupload the backup. That said, prevention is always better than cure, and a site should never be reuploaded unless the security issues that caused the hack in the first place have been fixed. Still, having backups will give the confidence that it is possible to stop a hacker in their tracks, without having to rebuild the site from scratch.
Green says: “Companies really shouldn’t wait to think about security until there’s a problem – it’s never too early to start protecting your greatest online asset.” BMJ •
www.foxtrot-technologies.com
32
www.buildersmerchantsjournal.net December 2022
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40