theDocumentId => 1336959 7 Ways SMBs Can Secure Their Websites

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/4/2020
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Ways SMBs Can Secure Their Websites

Here's what small and midsize businesses should consider when they decide it's time to up their website security.
Previous
1 of 8
Next

Image Source: Adobe Stock -- Monster Ztudio

Image Source: Adobe Stock -- Monster Ztudio

Too often small and midsize business (SMBs) run websites that aren't secure or even have the basics, such as SSL encryption technology or a Web application firewall.

It's understandable: SMB owners are typically very busy and wear many hats. Few have an IT person on staff, let alone a professional security person. Yet few can do security on their own.

What's an SMB to do? Turning to the site's Web hosting provider to find out what security features it offers is a good start. Getting recommendations for and then interviewing at least two or three other specialty security providers would be the next steps for an SMB to determine whether a security specialist makes sense.

Working with a provider for basic website security doesn't have to break the bank, says Monique Becenti, a product and channel marketing specialist at SiteLock. Depending on the site and how much e-commerce traffic the business runs, it's possible to have a strong level of security for roughly $1,000 a year.

Pricing will vary based on how many features are required and how much real business is done on the site. The advice on the following seven slides provides an excellent game plan for when SMBs decide it's time to up their website security.

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sarahtvargas
50%
50%
sarahtvargas,
User Rank: Apprentice
3/18/2020 | 7:43:19 AM
Re: Get Online Help
In case you're utilizing any of the mainstream CMS resembles WordPress, Joomla, Drupal, and so on., keep them refreshed consistently. Not once every month, or just when you consider it - consistently. Fortunately, digital marketing Toronto mostly uses WordPress theme, can auto-update it's center records. However, you'll must be sure that the modules are refreshed too. 
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3663
PUBLISHED: 2021-07-25
firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts
CVE-2021-23413
PUBLISHED: 2021-07-25
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
CVE-2021-37436
PUBLISHED: 2021-07-24
Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing pers...
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...