Keeping Your Online Store Bustling and Profitable #NCSAM #BECYBERSMART #DOYOURPART

Securing Your Online Store for the Holidays

Shopping season is here, and so is the opportunity for ecommerce site owners to grow their business and generate revenue. In lieu of the changing global ecommerce climate that this pandemic has produced, comes the importance of securing your website to protect your users — and your revenue streams. Your ... Read More
Webinar: Personal Online Privacy - Sucuri Security

Personal Online Security – Account Management

Continuing a series on how to better strengthen your personal online privacy, we are looking to take personal inventory of how we connect online. These were themes covered during our webinar “Security Beyond Your Website: Personal Online Privacy” and in a Twitter conversation (through the #Digiblogchat weekly forum) on this ... Read More
Personal Online Privacy – Data & Browser Privacy

Personal Online Privacy – Data & Browser Privacy

Continuing a series on how to strengthen your personal online privacy, we are taking personal inventory of how we connect online. These were themes covered during our webinar on “Security Beyond Your Website: Personal Online Privacy” and during a Twitter conversation (through the #Digiblogchat weekly forum). The first post in ... Read More
Webinar: Personal Online Privacy - Sucuri Security

Personal Online Privacy – Connecting Online

When California passed an online privacy law that will take effect on Jan. 1, 2020, it made me think about a user’s responsibility when it comes to how we engage online. As online privacy starts to become a larger discussion, it’s important we take personal invexntory of: How are we ... Read More
How Passwords Get Hacked - Sucuri Security

Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, most advice can often be too broad; different content management systems (CMS) exist in this ecosystem, and each requires a unique security configuration. This is why we have an application profiling engine in the Sucuri ... Read More
Internet Cookies: What Are They and Are They Good or Bad?

Internet Cookies: What Are They and Are They Good or Bad?

Cookies! I LOVE Cookies. Oatmeal raisin are one of my particular favorite flavors. However, we’re not here to talk about baked goods as much as I’d love to. We’re here to talk about itty bitty little files stored on your local machine, also called cookies. We’ve often come across several ... Read More

How to Create a Website Maintenance Plan & Contract

In my years of experience working alongside agencies, I’ve realized that managed providers and other web pros who offer website maintenance to their clients, have a hard time convincing them on the value of managed services. It’s a common mindset. Much like the homeowner who is unwilling to invest in ... Read More
What is a DDoS Attack & How to Stop It

How to Stop a DDoS Attack & Prevent Future Attacks

DDoS attacks are a growing threat for websites. But do you know how to mitigate them in their tracks? We’ll cover some essential fundamentals on stopping a DDoS attack and preventing them from happening in the future. Specifically, as a webmaster, keeping your site online during large traffic spikes is ... Read More
What is a Website Audit Log & Why Are They Important?

7 Things You Should Monitor in WordPress Activity Logs

WordPress activity logs can be helpful when troubleshooting or trying to identify a hack. In this article, you’ll learn about the seven things you should monitor in your WordPress logs. Over the years, WordPress has grown more complex. WordPress is used by people in a variety of environments, ranging from ... Read More
PCI for SMB: Requirement 12 – Maintain an Information Security Policy

PCI for SMB: Requirement 12 – Maintain an Information Security Policy

Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questionnaires). In the previous articles written about PCI, we covered the ... Read More