Are online businesses properly locking their proverbial shop doors at night?

By Abby Hardoon

Web hacking is on the up, and with higher and higher quantities of sensitive and potentially valuable information being stored by online businesses, the damage that can result can be extremely painful for both the business and its customers.

Malware can be injected into any website which isn’t properly protected and perform an unnerving variety of unwanted actions. These can range from enabling botnets to control a business’s computers, enabling information to be stolen through a Trojan kit, infecting customers with malware through the company website, or enabling web application flaws to be exploited in order to steal products. Whatever the nature of the infection, the results are commonly a termination in their ability to trade in the short term and potentially a significant cost and reputational impact in the long.

How do sites get hacked?

There are unfortunately a number of ways that a committed hacker can find their way into a website. Common ways include;

    • Weak passwords – In a vain effort to remember our increasing number of daily-required passwords, we as a nation of computer dwellers tend, unfortunately, to dumb them down, or ‘keep them simple’. Whether it be PASSWORD, REX, or the nation’s favourite, 123456, this is commonly an oversight and presents an easy way in.

    • Vulnerabilities in Web-Applications – A large number of websites now implement interactive functionality in order to create a rich experience for users. These can be in the form of user blogs and forums, sign up for newsletters, online form submission etc. Unfortunately, while being necessarily engaging for users, these can present portals for hackers to inject malicious code onto the site.

    • Insecure FTP connections – A host of infections are injected into websites after the password and username used to connect to a site using FTP is sniffed by a silent trojan/rootkit that has been embedded on a computer of a website administrator. Once passwords and username are obtained, access the website and subsequent infection with web-malware are relatively simple.

    • Third party software – Another current trend in website development is the use of third party add-ons into websites in order to provide more interesting features to a user. These add-ons may provide geolocation, or image resizing but they also can, on occasion, harbour malicious code which will then be passed up through the chain.

Making sure your proverbial business door stays locked

In an effort to stay secure in the long term, for any online business it’s essential to adopt a level of consistent vigilance over any common areas of weakness.

    • With more advanced password cracking software being used by hackers, there is greater need than ever for whoever’s coming up with the passwords to get a little more imaginative. A seemingly random selection of number & letters is by far the most secure option.

    • For businesses using FTP, consider moving to a more secure solution like ssh/SCP/SFTP

    • Only install reputable third party plugins and update them regularly and individually

    • Make sure you regularly scan your business PC (s) with more than one Antivirus package

    • Use SSL to send emails

    • Choose your webhost carefully and make sure they’re providing round-the-clock active server monitoring, or even suPHP (see above)

    • If you’re currently on a shared hosting package, consider changing to a VPS (Virtual Private Server) which offers a whole different level of security. These days a VPS is a cost effective solution for small businesses and inherently more secure due to its separation from other sites. Users can create custom firewalls and install other security measures that most hosts won’t allow on shared accounts.

In conclusion, vigilance and awareness of any potential areas of weakness within your online set up are your best weapons against having your website compromised. By ensuring your systems are secure, based on taking best practice advice such as that offered above, and implementing a brief but regular schedule of checks, antivirus scans and updates, chances are that for any hacker, the time and effort required to search out any way of infiltrating your system will ensure they move along in search of an easier target.

About the author

Abby Hardoon Founder & CEO of Daily Internet. Abby Hardoon is a marketing graduate from George Washington University, Washington DC USA. He was a founder of Host Europe Plc in 1997 and continued on as CEO after it floated on UK stock market right up to its sale to PIPEX in 2004 for over £31 million. During his tenure, Host Europe launched several high-flying brands such as Webfusion, 123-reg, Magic Moments and Dedicated Servers to underpin it dominant position as a market leader of hosting services within the UK. He started web hosting company Daily Internet in 2007, a next generation hosting service provider, with his team from Host Europe. Daily Internet supplies a broad range of hosting services from simple domain registration to email services, from shared web hosting to eCommerce and virtual private server (VPS) services.

About the company

Daily.co.uk is a second generation UK web hosting provider, delivering VPS or virtual private servers, web hosting, domain name registration, mobile optimisation, secure email, online shop and website building services to individuals and small businesses in the UK as well as essential products such as the DailyDrive and PC Back-up Client. The people behind Daily.co.uk have in-depth expertise and experience in the hosting sector and have built some of the UK’s best known web hosting brands. The Daily.co.uk web hosting platform benefits from this vast experience and track record.

http://www.daily.co.uk/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s