Ask Sucuri

OWASP Top 10 Security Risks – Part IV

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top…

2 years ago

How to Prevent Cross-Site Contamination for Beginners

What is Cross-Site Contamination? Cross-site contamination happens when a hacked site infects other sites on a shared server. Think of…

2 years ago

My Website Was Hacked on Christmas Eve

Christmas is a wonderful time to spend with family and friends. A lot of kids look forward to opening their…

2 years ago

Naughty or Nice Websites

Santa Claus is coming! Was your website naughty or nice this year? Here is a quick checklist of the top…

2 years ago

OWASP Top 10 Security Risks – Part III

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP…

2 years ago

What is Phishing?

Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You…

2 years ago

Navigating Data Responsibility

As we take a step back and think about how much the Internet has grown over the past 20 years,…

2 years ago

A Scam-Free Cyber Monday for Online Businesses

Every year we see an increase in website attacks during the holidays.  While business owners see their sales go up…

2 years ago

PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

Welcome to the sixth post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want…

2 years ago

Real-Time Fine-Tuning of the WAF via API

Though the Sucuri Firewall is simple to set up and protects your website immediately, it’s possible to have granular control…

2 years ago