Small Business Sees A Rise In Cyber Threats

Come on, let’s all live in the real world: we’re all vulnerable. Really the only chance you have these days is to make it as difficult as possible for any potential hacker to get to your valuable data. First and foremost this means protecting your data in transit. Using secured connections to transmit data is crucial to any protection strategy. In web terms that means having an SSL certificate installed. There are some variations but most provide 128 or 256 bit encryption which has been relatively reliable, although security loopholes were recently discovered.

Fixed? Yes, but can we be sure. The heartbleed bug went undetected for some time. What else could be lurking out there that we haven’t discovered yet?

Secondly, protect sensitive data at rest. This means encrypting your database. We like to use AES256 encryption. It isn’t foolproof, but it is strong and recommended by everyone’s favorite secret organization, the NSA.

Third, protect your passwords. This means letting your staff know how important keeping this data safe. Don’t leave passwords out in the open and, for the love of everything holy, make them strong. “123456” is not a password (we feel we should not have to mention at this point, but still will, that “password” is not clever… and never was). Keep your passwords safe – sometimes it’s best to create a little song to remember it. Or if you have many passwords, create an algorithm to remember them by. For instance, use the name of the domain you’re accessing to configure a password. If you were logging into Livewiregeeks.com, you might use the L and S as the first two letters of your password, then add some variation, take the numerical representation of that letter and att that to the password. So for a domain called ABC.com, if might be AC321 (the numbers being C=3, B=2, A=1 , added together =5). As long as you remember the process of creating the password, you don’t have to remember anything else. Just looking at the domain will enable to to know the password.

Tedious? yes. Works? yes.

Some more information on the current cyber security situation.

More Web Design Blog Content

Local Search Listing Management on Google

Building a strong customer base in your local community has always been one of the most significant components in the success of a business. With over 50% of Google searches completed on mobile devices, it’s more important than ever that on-the-go users can locate your business fast through

Getting Accurate Shipping Rates

If you own an ecommerce store and provide real time shipping rates you have likely encountered a long list of issues with returning accurate rates. If you have not, Bravo good sir or madam! You are the exception. Having real-time shipping rates on your online store is a

Why is WordPress our Go-To CMS?

Easy. It’s easy. Easy to use, operate and teach. We have dealt with virtually every blogging and Content Management Software out there, in existence, forever. Seen them all. Virtually all of them have their individual issues, yes, even WordPress. But few are as intuitive and easy to learn.

Offline linking

This is a profound point. A lot of linking takes place offline. Sounds weird but many great links sprout from the personal relationships you make as a business. Noteworthy links can be found at your local chamber of commerce just like any Hotfrog or elocal directory site. “This

Responsive Design and Why it is important for your Small Business Website

Responsive design provides users with quick seamless access to the same content regardless if they are using a smartphone, a tablet, or a laptop/desktop. “Web Design is responsive design, Responsive Wed Design is web design, done right.” – Andy Clarke A responsive design website responds to the device

No Business is too Small for Mobile

No matter how small your business is, you need to be on mobile. There are more mobile users these days than traditional desktop/laptop users, so the benefit is apparent. If your website is not mobile ready, you are at a distinct disadvantage. First, the user will probably have