Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/4/2020
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Ways SMBs Can Secure Their Websites

Here's what small and midsize businesses should consider when they decide it's time to up their website security.
Previous
1 of 8
Next

Image Source: Adobe Stock -- Monster Ztudio

Image Source: Adobe Stock -- Monster Ztudio

Too often small and midsize business (SMBs) run websites that aren't secure or even have the basics, such as SSL encryption technology or a Web application firewall.

It's understandable: SMB owners are typically very busy and wear many hats. Few have an IT person on staff, let alone a professional security person. Yet few can do security on their own.

What's an SMB to do? Turning to the site's Web hosting provider to find out what security features it offers is a good start. Getting recommendations for and then interviewing at least two or three other specialty security providers would be the next steps for an SMB to determine whether a security specialist makes sense.

Working with a provider for basic website security doesn't have to break the bank, says Monique Becenti, a product and channel marketing specialist at SiteLock. Depending on the site and how much e-commerce traffic the business runs, it's possible to have a strong level of security for roughly $1,000 a year.

Pricing will vary based on how many features are required and how much real business is done on the site. The advice on the following seven slides provides an excellent game plan for when SMBs decide it's time to up their website security.

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sarahtvargas
50%
50%
sarahtvargas,
User Rank: Apprentice
3/18/2020 | 7:43:19 AM
Re: Get Online Help
In case you're utilizing any of the mainstream CMS resembles WordPress, Joomla, Drupal, and so on., keep them refreshed consistently. Not once every month, or just when you consider it - consistently. Fortunately, digital marketing Toronto mostly uses WordPress theme, can auto-update it's center records. However, you'll must be sure that the modules are refreshed too. 
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23396
PUBLISHED: 2021-06-17
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
CVE-2021-32681
PUBLISHED: 2021-06-17
Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`Ch...
CVE-2013-20002
PUBLISHED: 2021-06-17
Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.
CVE-2020-19202
PUBLISHED: 2021-06-17
An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected p...
CVE-2020-35373
PUBLISHED: 2021-06-17
In Fiyo CMS 2.0.6.1, the 'tag' parameter results in an unauthenticated XSS attack.