Currently set to No Index

The Top 8 Web Security Falsehoods and Blunders

These days, many web security experts say that there are only two types of businesses left in America: those that have experienced a breach and those that don’t know they have. The same can be said for most individuals in the United States. With hacking becoming practically commonplace, most people are unaware of how insecure their web presence is, both at home and on the job.

Over the past year there have been numerous web security blunders, especially when it comes to the personal data held by companies. In 2013, an annual Verizon report counted over 600 data breaches, with more than 40,000 security incidents. The 2014 annual report found that 92 percent of the incidents analyzed by Verizon were found to use only nine attack patterns, leaving the experts to wonder what businesses and individuals are doing wrong to continue to miss the signs of a breach.

Falsehood: Nobody Wants to Hack Your Company

Most people and business owners want to assume that they are immune to cybercrime, especially if they run a relatively unknown company or feel as though they are an anonymous presence online. In an ideal world, everyone would be able to use the internet without fear of a security attack. However, today there are hackers busy at work all of the time, making it essential to protect your – and your customers – personal data. If your website holds any personal information, you need to equip your server with a reputable web security service. The anti-hacking companies that release regular updated versions of their software are the most trustworthy.

Blunder: Target’s Credit Card Fiasco

RELATED:   Big Data #6: Before Giving Your Big Data Project to a Contractor ...

Last November, retail giant Target was the target of hackers. An in-store scam resulted in over 40 million credit and debit card numbers being stolen from customers. Six months prior to the attack, Target executives had ordered the installation of a $1.6 million tool for malware detection that is used by other huge companies, including the Pentagon and the CIA. With a team of web security specialists on the job 24/7 to monitor Target’s web security operations, many wonder what they missed. The hackers uploaded malware and were able to extract the credit card information, as well as 70 million phone numbers, addresses and other important pieces of data. Apparently, the heavy-duty anti-hacking protection set up by Target that noticed the breach was not enough to stop the hackers before customers’ information was gone.

Falsehood: Firewalls Offer Enough Protection

Installing a firewall may be a good way to offer a little bit of protection, but hackers can make external attacks fairly easily by compromising the safeguard. There are several ways that cybercriminals can get through a firewall, including the following:

  • DoS attack
  • SQL injection
  • Man-in-the-middle attack
  • Cross-site scripting
  • Trojan horse
  • Brute force

Your system could be vulnerable to these types of attacks if you don’t use strong enough security software to keep hackers from injecting their own controls and getting ahold of your information that needs to be secured. Online businesses are extremely prone to hacker attacks, since hackers can use a LAN connection or an imitation wireless hotspot to obtain data. A firewall may sound secure, but alone it is not enough.

Blunder: Adobe’s Password Debacle

RELATED:   Authentication Hacking: Is Your Site Vulnerable?

As one of the biggest producers of computer software, many people would assume that Adobe would be safe from a web security breach. However, last October the company was attacked and lost information that affected 38 million customers. The hackers were able to obtain Adobe IDs, encrypted passwords, credit card numbers and expiration dates for the company’s active users. Additionally, the company admitted that another incident led to the theft of numerous source codes for Adobe products – such as Acrobat, ColdFusion and Photoshop – that could have been related to the personal information attack.

Falsehood: Your Passwords Are Secure

As a result of the Adobe security breach, experts were made aware of how weak many online consumers’ passwords really are. Some of the most popular among Adobe users included password, photoshop and 1234. It is assumed by many that their passwords are secure, and they don’t need to be changed if there hasn’t been a problem. In reality, hackers can install malicious software that exposes login details. If companies and individuals change their passwords regularly, using passwords that are not similar each time, attackers are not able to see a password pattern, which makes hacking more difficult. All it takes is one hacker getting hold of the one password used for all accounts to have personal information stolen.

Blunder: The Syrian Electronic Army’s Twitter Takeover

In 2013, hacking went beyond stealing data from corporations and became a global statement for groups interested in online warfare. The Syrian Electronic Army, which started in 2012, targeted the social media accounts of media companies the group believed were publishing stories that supported Syrian rebels. The group was able to hack into the Twitter feeds of several major media outlets, including:

  • The New York Times
  • The Guardian
  • The Financial Times
  • The BBC
  • The Onion
RELATED:   PHP and Common Web Hosting Security Issues

Some of the Twitter takeovers resulted in plummeting stocks in the United States, showing just how much control the SEA could gain by posting false new stories on the sites of highly-reputable media sources.

Falsehood: Using File Backups Will Keep Your Site Secure

Unfortunately, file backups are not a prevention against hackers. While they are a valuable tool for keeping a copy of important data backed up in the case of a security breach, they do not keep hackers from attacking a server. Additionally, a hacker can use was is called data debase to change on-site and backup files, so companies and home internet users should implement other methods of protection if they don’t want to be the victim of a cybercrime.

Blunder: Chinese Hackers

Over several months, government-backed hackers in China were able to get into the New York Times, allegedly in search of details about the sources used to write a story about China’s prime minister, Wen Jiabao. Security researchers were able to uncover the group’s involvement in the theft of data from over 140 organizations across the globe. If anything, the past year has proven that no one is completely safe against online attacks. The best people and companies can do is make it as difficult as possible for hackers to gain access to their information with high-quality web security software.

Top image ©GL Stock Images

How to Find a Successful Name For Your New Blog?
How to Find a Successful Name For Your New Blog?

One of the most important decisions you can make to ensure your blog is among the best is to select a name. While there are more than 500 million blogs available...

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Leave a Reply

Your email address will not be published. Required fields are marked *