Small Business Sees A Rise In Cyber Threats

Come on, let’s all live in the real world: we’re all vulnerable. Really the only chance you have these days is to make it as difficult as possible for any potential hacker to get to your valuable data. First and foremost this means protecting your data in transit. Using secured connections to transmit data is crucial to any protection strategy. In web terms that means having an SSL certificate installed. There are some variations but most provide 128 or 256 bit encryption which has been relatively reliable, although security loopholes were recently discovered.

Fixed? Yes, but can we be sure. The heartbleed bug went undetected for some time. What else could be lurking out there that we haven’t discovered yet?

Secondly, protect sensitive data at rest. This means encrypting your database. We like to use AES256 encryption. It isn’t foolproof, but it is strong and recommended by everyone’s favorite secret organization, the NSA.

Third, protect your passwords. This means letting your staff know how important keeping this data safe. Don’t leave passwords out in the open and, for the love of everything holy, make them strong. “123456” is not a password (we feel we should not have to mention at this point, but still will, that “password” is not clever… and never was). Keep your passwords safe – sometimes it’s best to create a little song to remember it. Or if you have many passwords, create an algorithm to remember them by. For instance, use the name of the domain you’re accessing to configure a password. If you were logging into Livewiregeeks.com, you might use the L and S as the first two letters of your password, then add some variation, take the numerical representation of that letter and att that to the password. So for a domain called ABC.com, if might be AC321 (the numbers being C=3, B=2, A=1 , added together =5). As long as you remember the process of creating the password, you don’t have to remember anything else. Just looking at the domain will enable to to know the password.

Tedious? yes. Works? yes.

Some more information on the current cyber security situation.

More Web Design Blog Content

New Web Program: Brain Development Maps

Creating braindevelopmentmaps.org was a great opportunity to work on a very interesting site; Shirley came to Livewire with very specific needs. There is nothing ‘typical’ or ‘standard’ about this website, it is in a word, unique. Braindevelopmentmaps.org allows users to view highly detailed brain mapped images online. These

Early Learning Coalition Has A New Website

The ELC of alachua county came to us looking for some help with their current website. They had evidently been hacked on their Joomla installation and there were a number of issues that rippled out from that. We attempted to fix the installation but the site was outdated

Web Marketing Staff Training

How easy is it for one to do their own SEO? Difficulty level: 5 out of 10 If you know how to use a computer and can spare 3-5 hours per week then it is perfectly reasonable to expect you can do your own SEO and save hundreds

Raven Tools

Took a look at Raven SEO tools today. Really, not all that impressed. They have a good price but it mostly looks like you’re just hooking up other services to be managed in one location. That’s valuable in and of itself, but not really what we’re looking for

Don’t Get Smacked by Copyright Infringemnt

Developers do it all the time – they need an image for a website and head on over to Google images, put a keyword in and voila! Free pictures for everyone! Not so fast. Many of these images are protected under copyright law and if you get caught,

How To Survive A Good Google Dinging

This is a great demonstration of what can happen with unnatural linking schemes and getting hosed by using link farms. This company did some black-hat SEO and it came back to bite them. Luckily the article shows that it is possible to recover from a Google update nightmare, but