Small Business Sees A Rise In Cyber Threats

Come on, let’s all live in the real world: we’re all vulnerable. Really the only chance you have these days is to make it as difficult as possible for any potential hacker to get to your valuable data. First and foremost this means protecting your data in transit. Using secured connections to transmit data is crucial to any protection strategy. In web terms that means having an SSL certificate installed. There are some variations but most provide 128 or 256 bit encryption which has been relatively reliable, although security loopholes were recently discovered.

Fixed? Yes, but can we be sure. The heartbleed bug went undetected for some time. What else could be lurking out there that we haven’t discovered yet?

Secondly, protect sensitive data at rest. This means encrypting your database. We like to use AES256 encryption. It isn’t foolproof, but it is strong and recommended by everyone’s favorite secret organization, the NSA.

Third, protect your passwords. This means letting your staff know how important keeping this data safe. Don’t leave passwords out in the open and, for the love of everything holy, make them strong. “123456” is not a password (we feel we should not have to mention at this point, but still will, that “password” is not clever… and never was). Keep your passwords safe – sometimes it’s best to create a little song to remember it. Or if you have many passwords, create an algorithm to remember them by. For instance, use the name of the domain you’re accessing to configure a password. If you were logging into Livewiregeeks.com, you might use the L and S as the first two letters of your password, then add some variation, take the numerical representation of that letter and att that to the password. So for a domain called ABC.com, if might be AC321 (the numbers being C=3, B=2, A=1 , added together =5). As long as you remember the process of creating the password, you don’t have to remember anything else. Just looking at the domain will enable to to know the password.

Tedious? yes. Works? yes.

Some more information on the current cyber security situation.

More Web Design Blog Content

Google Local

In today’s digital world, it is essential for businesses to have an online presence. Google Maps is one of the most significant tools for local companies, since it helps potential customers locate and learn about your business. Having a presence on Google Maps is not sufficient; you must

What is Lorem Ipsum?

Lorem ipsum is simply Latin text. Gobbledygook, essentially. Well, not really; It does have its roots in latin text from just before the BC to BCE line, so that puts it around 2000 years old. Past that, it’s gibberish.  Sometimes web developers need filler text to create web

Firefox is dead to me

That happened a long time back. Now it seems that the once beloved browser is now in the same situation with the majority of its former users. I personally feel that the browser lost its roots in version 12, but it was showing signs of becoming yesterdays news

Redirects & Canonical. What’s The Difference?

There is a lot of confusion about the difference between setting redirects and canonicalization. Here’s the deal. What a 301 says to search engines. Hello, Mr. Search Engine. My page has has moved, permanently, to this other address. If you will please remove my old domain from your

Should you be wary of SEO firms?

Good Call Commander! You should absolutely be suspicious of SEO firms these days. The industry is unfortunately saturated with unscrupulous, downright devious companies that prey on  unsuspecting business owners attempting to better their rankings. They pump your site full of fluff and post thousands of links around their

What’s Worse?

What’s worse than these dang North Florida love bugs? Having a poor website, for one. A website should be like the dream employee . It should never call in sick, treat your customers properly and get them the information and the attention the require each and every time.