Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/1/2011
10:45 AM
50%
50%

4 Tips: Make Your SMB Website More Secure

Consider this expert advice on how small and midsize businesses can build websites that are well-protected from attacks--and keep them safe.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
There are many facets of a complete security plan, but smaller businesses that rely heavily on their websites for revenue need to pay particular attention to protecting them.

You need look no further than recent hacking headlines to understand why. Alan Wlasuk, CEO of 403 Web Security, offers four key areas for SMBs to consider when building and maintaining secure websites.

Make Security Part of Web Development

If you're now building a site, include security as a part of the project plan. In an interview, Wlasuk recommended doing an automated vulnerability scan of your site before it launches to identify potential holes. He distinguishes this from antivirus or other types of security software. Instead, it's like launching a simulated attack--thousands of them--on your site to see if any of them work. (There are security firms like Wlasuk's that offer free versions of these scans.)

"They don't cover the entire world of security for the website, but they'll give you a clear indication of whether you've got a relatively solid site or if you're in deep trouble to start off with," Wlasuk said. "It's a must for anybody putting together a new site."

Wlasuk advises SMBs that are planning to hire an outside Web development firm to make security part of the selection process; interview potential vendors on their security approach in the same way that you'd ask about design or functionality.

If you've already launched? It's not too late--you should still run a vulnerability scan to check for leaky code. If you find problems, Wlasuk said, resolve the biggest ones first and work your way down the list.

"Make sure that you're not opening yourself up for the kiddie scripters to just walk in and have a good time because they can," Wlasuk said. "Make it hard for someone to get into the site--if you're not the low-hanging fruit, they'll go after someone else."

Keep Employees in the Know

Time and again, human beings are the most volatile threat vector, whether it's a social engineering scam, a phishing attack, or simply an employee who thinks they're doing the right thing--when in fact they're turning over the keys to the corporate castle.

Invest in educating employees on current security threats and best practices; you can't completely eliminate human error, but you can mitigate it. In terms of website security, Wlasuk recommends the "trust but verify" approach with employees--don't be paranoid or undermine your company culture, but ensure that your trust is well-placed. To that end, if some staffers don't need access to your content management system or other databases, don't give it to them. Treat website administrative credentials like valuable company assets.

"Minimally, gather up your staff and tell them what social engineering's all about," Wlasuk said, adding that there are plenty of examples that function as entertaining cautionary tales for presentation purposes. "Have a casual conversation, do a lunch-and-learn--do something so that people aren't totally unaware."

Treat Your Physical Office Like an "Attack Surface"

Much like your website itself can have backdoors beckoning to the bad guys, so too can your physical office. Wlasuk advises to treat your physical office as an entry point to your website--and, of course, to your entire corporate network. No Post-it notes with passwords; no lonely LAN cables inviting just any laptop to plug in and take a digital stroll through the network.

"We all know our offices are often in disarray," Wlasuk. This makes SMBs particularly prone to social engineering attacks. "The cleaning people are going to let anybody with a tie in that says they work for the company, and those people are going to sit down and try to figure out where your vulnerabilities are."

Wlasuk poses a question for SMB owners and managers to ask themselves: "Is silly stuff just hanging out there for anybody to pick up on and use against you within your office?"

Have a Long-Term, Calendared Plan

Website security isn't a set-it-and-forget-it proposition; the threats change on a regular basis. Automated vulnerability scans should be a part of an ongoing security plan, according to Wlasuk; he advises running checks at least every three to six months.

"The world will change," he said. "The hackers get more clever, or your website changes."

Like other security pros, Wlasuk is adamant that SMBs stay on top of security patches for their operating system and other business-critical applications; if you use a commercial (or even free) content management system to administer your website, don't fall behind on software updates.

Periodically review employee authorization for website management, too.

"Make sure the people who have access are the people who really need it," Wlasuk said. "You do not want your entire staff to have the ability to update your website because they can unknowingly introduce all sorts of flaws--or sometimes, unfortunately, knowingly can. Only allow your most trusted people into places where they can cause security risks."

Small and midsize businesses are falling prey to cyberattacks that cost them sensitive data, productivity, and corporate accounts cleaned out by sophisticated banking Trojans. In this report, we explain what makes these threats so menacing, and share best practices to defend against them. Download it now. (Free registration required.)

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ambreen11
50%
50%
ambreen11,
User Rank: Apprentice
12/26/2012 | 7:05:56 AM
re: 4 Tips: Make Your SMB Website More Secure
Sometimes no matter how much time you spend securing and policing your site, hackers find a way in. So backup your site regularly and keep those backups off your server. Then, if your site is hacked, you can return to normal operations quickly by restoring files and site content. Thanks
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.