SiteLock. Internet Security: Big Threats for Small Business. Presented by: Neill Feather, President

Similar documents
Introduction: 1. Daily 360 Website Scanning for Malware

A Network Administrator s Guide to Web App Security

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Application Security Testing

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Simple Steps to Securing Your SSL VPN

Table of Contents. Page 2/13

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

The Top Web Application Attacks: Are you vulnerable?

The Key to Secure Online Financial Transactions

ensuring security the way how we do it

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Passing PCI Compliance How to Address the Application Security Mandates

October 10, Report on Web Applications #13-205

Society for Information Management

SecurityMetrics Vision whitepaper

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Auditing the Security of an SAP HANA Implementation

Reducing the Cost and Complexity of Web Vulnerability Management

Hope for the best, prepare for the worst:

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

External Supplier Control Requirements

CEH Version8 Course Outline

Security from the Cloud

Cloud Security:Threats & Mitgations

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

The Cyber Threat Profiler

Web App Security Audit Services

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Web Application Penetration Testing

Penetration Testing. Presented by

GlobalSign Malware Monitoring

CONTENTS. PCI DSS Compliance Guide

Enterprise-Grade Security from the Cloud

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015

WHITEPAPER. Nessus Exploit Integration

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Hacking the WordpressEcosystem

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

PCI Compliance Updates

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Developing Secure Software in the Age of Advanced Persistent Threats

Reducing the Cost and Complexity of Web Vulnerability Management

IBM Security Strategy

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Web Application Security Considerations

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Online Vulnerability Scanner Quick Start Guide

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Cyber Exploits: Improving Defenses Against Penetration Attempts

Protecting Sensitive Data Reducing Risk with Oracle Database Security

CRYPTUS DIPLOMA IN IT SECURITY

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Rational AppScan & Ounce Products

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Application Report

Web Engineering Web Application Security Issues

8070.S000 Application Security

Making Database Security an IT Security Priority

A Case for Managed Security

Reference Architecture: Enterprise Security For The Cloud

IBM Managed Security Services Vulnerability Scanning:

Bringing Continuous Security to the Global Enterprise

IJMIE Volume 2, Issue 9 ISSN:

Making Your Enterprise SSL Security Less of a Gamble

Overview of the Penetration Test Implementation and Service. Peter Kanters

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

A Review of Web Application Security for Preventing Cyber Crimes

Reducing Application Vulnerabilities by Security Engineering

SiteLock SECURE Partner Program FAQ

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

THE OPEN UNIVERSITY OF TANZANIA

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Presented by Evan Sylvester, CISSP

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Hope for the best, prepare for the worst:

USM IT Security Council Guide for Security Event Logging. Version 1.1

The Leading Provider of Endpoint Security Solutions

Website Security: What do I need to know? What do I need to do?

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Host/Platform Security. Module 11

From the Bottom to the Top: The Evolution of Application Monitoring

Common Security Vulnerabilities in Online Payment Systems

Columbia University Web Security Standards and Practices. Objective and Scope

Security Testing and Vulnerability Management Process. e-governance

Mobile Application Security Sharing Session May 2013

Transcription:

SiteLock Internet Security: Big Threats for Small Business Presented by: Neill Feather, President

Protect your Small Business Customers They are a sizable investment Number of U.S. Small Businesses 26.9 M Percent of U.S. Firm Population (in # of Employees) 91.8% Percent of U.S. Business Revenue Earned by SMB s 61.4% One-year U.S. SMB Revenue $11.4T Small Business Trends; restating US SBA.gov report

Why the SMB Market is at Risk: A closer look Over 60% of data breaches are at companies with <100 employees * Nearly half involved malware injections 98% of ALL applications have holes ** 68% of vulnerabilities found are XSS ** Over 6,000 websites are blacklisted every day *Verizon, US Secret Service Report **HP Security Report

What Website Security Means Be proactive Design and build websites with security in mind Take additional care to harden open-source applications Sanitize dynamic content to ensure safety of interaction Identify and repair likely vectors for attacks Code injections Weak or unencrypted login pages and credentials Out-dated applications Employ non-intrusive security practices to identify and remediate potential problems before hacks occur React quickly Detect and clean malware before websites are blacklisted

Business Impacts of Poor or Reactive Security Small business websites can be shut down Business reputation is damaged Revenue can be lost Customer data is at risk Search engine rankings plummet

The Most Common Threats to SMB s SQL Injections Poor Server Configuration / Authentication (Credential Theft) SQL Injection combined with Malware Malware UK Security Breach Investigations Report, 2010

The Threat/Vulnerability Evolution Cross Site Request Forgery Cross Site Scripting (XSS) Buffer Overflow SQL Injections Remote File Include (RFI) Denial of Service HP Top Cyber Risks Report, Mid-year 2011

Security is a Challenge for SMB s InformationWeek Analytics Strategic Security Survey, October 2011

Where do SMB s Turn for Help? Read forums and help websites and fixed it myself Tried several approaches, but site is still compromised Followed security company instructions provided Called a security/it expert/web developer to sort it out Nothing site seems OK now Abandoned the whole thing and set up a new site with a new provider Other Compromised Websites: an Owner s Perspective; StopBadware.org, CommTouch, 2012

Response from Hosting Provider None, never communicated the issue to them Provided assistance at no cost to help fix the compromised site No help provided, or refused to respond Charged additional fees to help fix the compromised site Compromised Websites: an Owner s Perspective; StopBadware.org, CommTouch, 2012

The Plan to Fight Back Technology - Turn-key - Always on - Business focus, not IT - Secure network - SSL - Firewall Process - Security standards - Strong passwords - File protection - Compliance requirements People - Education & awareness - Test your own site - Update web apps & plug-ins

The Ideal Complete Solution When considering internet security partners/providers, look for: A comprehensive set of security measures designed for prevention or detection. A range of scans that analyzes all web traffic, network and applications for threats. A process design, even the most effective protection cannot stop 100% of attacks. A trial to see if it is easy to use, the most effective toolset is of little use if you can t figure out how to use it. Consider solutions with a straightforward user interface or dashboard that will keep a user informed on what s going on. Key take-away: When it comes to website security, prevention is always the best policy.

Thank you Questions & Discussion Visit SiteLock: Booth #30 Email SiteLock: partners@sitelock.com