SiteLock is expanding the network behind our web application firewall, TrueShield, and our content delivery network, TrueSpeed. To accommodate our growing customer base, we’re adding over 130,000 new unique IP addresses on May 1st, 2017. This will require some customers to make changes to their firewall or web server configuration to ensure our new servers are compatible with your website’s hosting server. If these changes are not made by May 1st, 2017, your site visitors may be restricted from accessing your website.
Tag: web application firewall (WAF) (Page 1 of 3)
As a website owner, one of your main goals is to increase website traffic. Ultimately, the more traffic you have, the more revenue your business generates…right? Well, not necessarily. And we can explain why.
Bots represent over 60 percent of all website traffic, meaning there are potentially more Internet bots than humans frequenting your site. There are essentially two types of bots, “good” and “bad.” Good bots carry out jobs, like search engine crawling. Bad bots represent 35 percent of all bot traffic and perform malicious tasks, like DDoS attacks. Not to mention that the more web traffic visiting and requesting information from your site, the slower it renders.
Websites experience 22 cyberattacks per day on average. That’s more than 8,000 attacks per year, per website. You might assume the majority of these attacks are aimed at eCommerce sites because they accept and store credit card information, but actually, the eCommerce sector accounts for only one percent of compromised websites.
Cybersecurity continues to be an evolving challenge for website designers and developers. Everyday, hackers create new malware strains and perform sophisticated attacks that can devastate client websites.
SiteLock is promoting Cybersecurity Awareness Month and as a web designer or developer, it is imperative that you understand your role in the security of your clients’ websites. Many people assume that you are handling every aspect of the site, including its protection. Because of this, you must take action and understand how to provide that security.
More often than not, when people think of a hacker, they think of someone technologically infiltrating a network and stealing mass amounts of sensitive information sitting behind it. In actuality, hackers tend to employ methods that take advantage of individual users, often in tandem with some form of social engineering.
We celebrate Independence Day to honor the adoption of the Declaration of Independence on July 4, 1776. As Americans, we have the right to freedom of religion, speech, press, and the Internet.
You know that awkward moment when you’re screen sharing with your boss and a Viagra ad appears on your screen? It’s difficult to rebound from an embarrassing moment like that, even when you did nothing to prompt it. These “pharma” hacks happen all the time, and it is just one example of what can happen when a site falls victim to cyberattacks. Luckily, the team at SiteLock is here to help you avoid these rather uncomfortable situations.
SiteLock offers comprehensive, cloud-based website security solutions to businesses of all sizes. We protect websites from a multitude of attacks and threats, pharma hacks being just one example. Check out our video to learn more about who we are, what we do and how some of our products work.
Over one billion websites exist today. With an excess of websites to choose from, we hear many people ask, why did my site get hacked? How did it get hacked? What damage has been done? While there are various reasons and ways a cybercriminal could have hacked your site, there is a very good chance (80% to be exact) they were after your web applications. Web applications account for 80% of website vulnerabilities, making them a very attractive target to cybercriminals.
According to a recent report from Google, nearly all website owners rely solely on Google’s Safe Browsing program to alert them when their site has been hacked. The report concludes that only 6% of webmasters discovered an infection via proactive monitoring for suspicious activity. That’s alarming.
As a business owner, you’re constantly thinking about how best to protect and propel your company. But there’s one component that you may have overlooked: website security. Security breaches are inevitable, yet cybersecurity is often neglected. We’ve rounded three simple steps to make sure you’re covered: