Risk
7/1/2011
10:45 AM
Connect Directly
RSS
E-Mail
50%
50%

4 Tips: Make Your SMB Website More Secure

Consider this expert advice on how small and midsize businesses can build websites that are well-protected from attacks--and keep them safe.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
There are many facets of a complete security plan, but smaller businesses that rely heavily on their websites for revenue need to pay particular attention to protecting them.

You need look no further than recent hacking headlines to understand why. Alan Wlasuk, CEO of 403 Web Security, offers four key areas for SMBs to consider when building and maintaining secure websites.

Make Security Part of Web Development

If you're now building a site, include security as a part of the project plan. In an interview, Wlasuk recommended doing an automated vulnerability scan of your site before it launches to identify potential holes. He distinguishes this from antivirus or other types of security software. Instead, it's like launching a simulated attack--thousands of them--on your site to see if any of them work. (There are security firms like Wlasuk's that offer free versions of these scans.)

"They don't cover the entire world of security for the website, but they'll give you a clear indication of whether you've got a relatively solid site or if you're in deep trouble to start off with," Wlasuk said. "It's a must for anybody putting together a new site."

Wlasuk advises SMBs that are planning to hire an outside Web development firm to make security part of the selection process; interview potential vendors on their security approach in the same way that you'd ask about design or functionality.

If you've already launched? It's not too late--you should still run a vulnerability scan to check for leaky code. If you find problems, Wlasuk said, resolve the biggest ones first and work your way down the list.

"Make sure that you're not opening yourself up for the kiddie scripters to just walk in and have a good time because they can," Wlasuk said. "Make it hard for someone to get into the site--if you're not the low-hanging fruit, they'll go after someone else."

Keep Employees in the Know

Time and again, human beings are the most volatile threat vector, whether it's a social engineering scam, a phishing attack, or simply an employee who thinks they're doing the right thing--when in fact they're turning over the keys to the corporate castle.

Invest in educating employees on current security threats and best practices; you can't completely eliminate human error, but you can mitigate it. In terms of website security, Wlasuk recommends the "trust but verify" approach with employees--don't be paranoid or undermine your company culture, but ensure that your trust is well-placed. To that end, if some staffers don't need access to your content management system or other databases, don't give it to them. Treat website administrative credentials like valuable company assets.

"Minimally, gather up your staff and tell them what social engineering's all about," Wlasuk said, adding that there are plenty of examples that function as entertaining cautionary tales for presentation purposes. "Have a casual conversation, do a lunch-and-learn--do something so that people aren't totally unaware."

Treat Your Physical Office Like an "Attack Surface"

Much like your website itself can have backdoors beckoning to the bad guys, so too can your physical office. Wlasuk advises to treat your physical office as an entry point to your website--and, of course, to your entire corporate network. No Post-it notes with passwords; no lonely LAN cables inviting just any laptop to plug in and take a digital stroll through the network.

"We all know our offices are often in disarray," Wlasuk. This makes SMBs particularly prone to social engineering attacks. "The cleaning people are going to let anybody with a tie in that says they work for the company, and those people are going to sit down and try to figure out where your vulnerabilities are."

Wlasuk poses a question for SMB owners and managers to ask themselves: "Is silly stuff just hanging out there for anybody to pick up on and use against you within your office?"

Have a Long-Term, Calendared Plan

Website security isn't a set-it-and-forget-it proposition; the threats change on a regular basis. Automated vulnerability scans should be a part of an ongoing security plan, according to Wlasuk; he advises running checks at least every three to six months.

"The world will change," he said. "The hackers get more clever, or your website changes."

Like other security pros, Wlasuk is adamant that SMBs stay on top of security patches for their operating system and other business-critical applications; if you use a commercial (or even free) content management system to administer your website, don't fall behind on software updates.

Periodically review employee authorization for website management, too.

"Make sure the people who have access are the people who really need it," Wlasuk said. "You do not want your entire staff to have the ability to update your website because they can unknowingly introduce all sorts of flaws--or sometimes, unfortunately, knowingly can. Only allow your most trusted people into places where they can cause security risks."

Small and midsize businesses are falling prey to cyberattacks that cost them sensitive data, productivity, and corporate accounts cleaned out by sophisticated banking Trojans. In this report, we explain what makes these threats so menacing, and share best practices to defend against them. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ambreen11
50%
50%
ambreen11,
User Rank: Apprentice
12/26/2012 | 7:05:56 AM
re: 4 Tips: Make Your SMB Website More Secure
Sometimes no matter how much time you spend securing and policing your site, hackers find a way in. So backup your site regularly and keep those backups off your server. Then, if your site is hacked, you can return to normal operations quickly by restoring files and site content. Thanks
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant