Small Business Sees A Rise In Cyber Threats

Come on, let’s all live in the real world: we’re all vulnerable. Really the only chance you have these days is to make it as difficult as possible for any potential hacker to get to your valuable data. First and foremost this means protecting your data in transit. Using secured connections to transmit data is crucial to any protection strategy. In web terms that means having an SSL certificate installed. There are some variations but most provide 128 or 256 bit encryption which has been relatively reliable, although security loopholes were recently discovered.

Fixed? Yes, but can we be sure. The heartbleed bug went undetected for some time. What else could be lurking out there that we haven’t discovered yet?

Secondly, protect sensitive data at rest. This means encrypting your database. We like to use AES256 encryption. It isn’t foolproof, but it is strong and recommended by everyone’s favorite secret organization, the NSA.

Third, protect your passwords. This means letting your staff know how important keeping this data safe. Don’t leave passwords out in the open and, for the love of everything holy, make them strong. “123456” is not a password (we feel we should not have to mention at this point, but still will, that “password” is not clever… and never was). Keep your passwords safe – sometimes it’s best to create a little song to remember it. Or if you have many passwords, create an algorithm to remember them by. For instance, use the name of the domain you’re accessing to configure a password. If you were logging into Livewiregeeks.com, you might use the L and S as the first two letters of your password, then add some variation, take the numerical representation of that letter and att that to the password. So for a domain called ABC.com, if might be AC321 (the numbers being C=3, B=2, A=1 , added together =5). As long as you remember the process of creating the password, you don’t have to remember anything else. Just looking at the domain will enable to to know the password.

Tedious? yes. Works? yes.

Some more information on the current cyber security situation.

More Web Design Blog Content

Thomas Jackson Updates

John Pailing and I have been hard at work upgrading what is already an incredible website. We have made several layout changes and are playing with a few ideas that will really add to the depth and relevance of the site. It is truly an honor to be

Hey, Look What We Did…

Our programmers are the best in the business. We just finished a great new project at referralfeelawyers.com. This service connects lawyers with lawyers that pay referral fees for, you guessed it, referrals. The website features custom attorney profiles, administrative control over practice areas and geographical data….all kinds of

Lawn Enforcement Agency Has A New Website

Lawn Enforcement came to us in need of some SEO advice. They were paying another company several hundred dollars per month and getting nowhere. We noted that there were many, many site structural problems with their current design and all the probably needed was a new site and

WordPress Custom Post Type Category Images : Solved

If you’re a WordPress developer, you’ve probably been here. You want to use images for your categories, but they are custom taxonomies. Here’s how to solve that issue. We’re using a plugin called “Category Images” by Muhammad Said El Zahlan. Download, install and activate the plugin. Now you can

Javascript functions, variables, objects

How JavaScript Enhances Modern Web Design and User Experience

JavaScript has transformed web design, making websites more interactive, dynamic, and user-friendly. Whether you’re running an e-commerce site, a business portfolio, or a blog, JavaScript plays a crucial role in creating a memorable user experience. In this post, we’ll explore how JavaScript can be used effectively in web

Sitemaps

Back in the day a simple website could get away with an on-page sitemap. Just a simple list of pages somewhere on the site. Not so much anymore. Sitemaps – at least the ones we intend for search engines to look at – are all internal. We use