Recently a client of ours was reporting a bogus checkout page appearing on their website. When trying to access their “my-account” page an unfamiliar prompt appeared in their browser soliciting credit card billing information: This form was foreign to our client and was clearly placed during a website compromise. Interestingly, the website itself doesn’t even […]
Archive by Author
Product Update: Sucuri Firewall in India
Sucuri is pleased to announce the completion of a strategic expansion, with the opening of a data center campus in Mumbai – India. This addition adds another layer of security and performance for customers located in the South Asian region. Our Mumbai site, along with our complete portfolio of POPs, meets the highest-tier – Level 1 PCI DSS compliance. POP distribution of the Sucuri network India is the seventh-largest country by area, the second-most populous country in the world, and home to several agencies and managed service providers. Continue reading Product Update: Sucuri Firewall in India at Sucuri Blog. Via Sucuri.net
Network Firewall vs. Web Application Firewall (WAF)
When the world shut their doors and began spending more time online, hackers saw a clear opportunity. The costs of data breaches continue to rise, and attacks are becoming harder to detect. Attackers are becoming more sophisticated and creative. According to a 2020 report by IBM, it took an average of 228 days to identify […]
How to Set Up a Content Security Policy (CSP) in 3 Steps
What is a Content Security Policy (CSP)? A CSP is a policy that uses headers or meta elements to restrict or greenlight what content loads onto your website. It is a widely-supported security standard recommended to anyone who operates a website. Why do you Need it ? Using a CSP adds a layer of protection […]
7 Scary Good Tips to Secure Your Website
Nothing pairs quite as well as cybersecurity and Halloween. Prepare for more than trick-or-treaters this spooky season with these 5 wicked Website Security tips. 1 – Make a horcrux ( aka backup your data) – In Harry Potter, a horcrux lets wizards store a fragment of their soul in different objects as a safeguard against […]
SSL Within the Context of Website Security
There is a common misconception that if someone adds SSL (Secure Sockets Layer) to their blog site or company website then it will protect them from cyber crimes. SSL only protects the data of the client who uses the website. Other than providing protection for website visitors’ data, SSL does not in fact make a […]
5 Tips for Long-Term Remote Workers
If you’ve just started remote working, are remote-curious, or are transitioning into a permanently remote position, these tips can help you find success working from home. If you are a remote-work veteran, you might learn a thing or two as well. Why This Trend will Outlive the Pandemic Because of the COVID-19 pandemic, many […]
What is Cryptocurrency Mining Malware?
Cryptocurrency mining malware is typically a stealthy malware that farms the resources on a system (computers, smartphones, and other electronic devices connected to the internet) to generate revenue for the cyber criminals controlling it. Instead of using video game consoles or graphics card farms, these particular cryptominers are using the computers and servers of the […]
What is Cryptocurrency?
Cryptocurrency is best thought of as a digital currency that only exists on computers. It is transferred between peers (there is no middleman like a bank). Transactions are then recorded on a digital public ledger called the “blockchain”. Transaction data and the ledger are encrypted using cryptography. That is why it is called “crypto” “currency”. […]
5 Types of Hackers & Why They Hack
When considering why hackers are attacking websites, you might think that there’s a specific reason they target you as a website owner—your business, your reputation, or your information. The truth is, while it feels personal to the victim, hackers rarely single out specific targets. Most of the time, hackers perform mass searches for specific vulnerabilities, […]