SlideShare una empresa de Scribd logo
1 de 46
[WEB]
[SECURITY]
Web SecurityWeb Security
“Web security is an important issue, and with a slew
of recent hacking attacks, it is that much more
essential that you know how to protect yourself.
Protecting your personal information and computer
is important for ANY internet user. Everyone is a
potential victim, and the less you know about
protecting yourself, then the more likely you will be
a target.
Don’t wait to address your web security until you are
attacked. At that point it might be too late! When it
comes to protecting yourself and your websites,
prevention of attacks, is much easier than
treatment.”
Section One:Section One:
PersonalPersonal
ProtectionProtection
“This section is all about protecting yourself,
your computer and your personal
information.”
Section One: Personal Protection
Password Creation & ManagementPassword Creation & Management
Password creation and management is one of the first
things you should consider when thinking about web
security. This is the very base of your pyramid of web
security.
Knowing how to properly create and manage strong
passwords is the perfect place to start the security
discussion.
Password Creation & Management
The following steps will ensure you create great passwords:
Avoid The ObviousAvoid The Obvious
The first thing you have to do is avoid the obvious. Do not use
anything like your name, birthdate or even any of your interests.
Don’t choose something that someone could guess!
You will also want to avoid the common passwords that every
noob uses. The top ten most used passwords list (shown below -
courtesy of Huffington Post) then you are a noob!
123456 princess
12345 rockyou
123456789 1234567
Password 12345678
Iloveyou abc123
In Fact Don’t Even Use a WordIn Fact Don’t Even Use a Word
No matter how clever you think you are - don’t even choose a word
- English or foreign. Any word that can be found in the dictionary
can be cracked using a brute force attack.
Sorry, Size MattersSorry, Size Matters
Know it is easier to remember 5 digits than 9, but guess what? Size
counts! If you chose a random string of 6 lowercase letters (or
worse a 6 letter word) it would take 10 minutes for a hacker to use a
brute force attack to figure that password out.
Mix Up CharactersMix Up Characters
To maximize your password’s security you need to mix up your
characters. This means you need to add symbols (%@#), numbers
and mix up the case of your letters (capitals and lower case).
Password Creation & Management
Following are some points you need to consider about HOW
to use these great passwords.
1. Have More Than One1. Have More Than One
Don’t use the same password everywhere on the web. If you
do, you highly increase the chance of having it compromised.
If someone is able to glean your password on one site they
may be able to put 2 and 2 together, and access other
accounts you own.
You can break down your passwords into 3 categories:
A Level - These are passwords that are super important, and
direct access to them could directly lead to financial trouble.
(i.e. Online Banking or Paypal)
Password Creation & Management
B Level - These passwords are also important, and while
getting hacked could cause trouble, the hacker won’t be able
to clear a bank account, or run up credit. (i.e. eMail, Twitter or
Facebook)
C Level - These passwords are for random free accounts
online. (i.e. Message Board, Blog Comments or Fantasy
Sports)
“You can also make your own categories if you want. Use
your own common sense when deciding which category a
password would fit in.”
Password Creation & Management
2. Change Password if Compromised2. Change Password if Compromised
If you ever have your password compromised - then you need
to change it ASAP. Not only do you have to change the
compromised password, you also have to change all of the
other accounts tied to that password.
3. Don’t Be Afraid to Use Software3. Don’t Be Afraid to Use Software
For people who have a whole bunch of passwords, you can
consider using software for password management. There is
paid software that can help you out.
“If you follow these three tips, your passwords will be managed
about as well as they can be. Remember, even if you haven’t
been compromised, you should still consider changing your
password every 6 months or so. This might seem like a
hassle, but it will help ensure your online safety.”
Password Creation & Management
Free Programs to ProtectFree Programs to Protect
Your Computer fromYour Computer from
VirusesViruses
“Speaking of prevention, anyone who is
planning to surf the web, should make sure
they have some security software installed
BEFORE they go online. At the very least a
good virus protection program should be
running. The good news is there are great free
programs to do just that!”
Free Programs to Protect Your Computer from
Viruses
Best Free Anti Virus Programs
1. AVG anti-virus protection1. AVG anti-virus protection
This software is simple to use and effective. The installation
instructions are so easy that even a “non-techie” can do. It was
also rated to be the top program when it comes to detection of
threats as determined by independent testing laboratories.
2. Avast anti-virus protection2. Avast anti-virus protection
It has the maximum protection for your computer and the
technology it uses can be tailored by the user. It also provides
a comprehensive filter and reliable website ratings. Its unique
features are media player, root kit detection and built-in
spyware.
Best Free Anti Virus Programs
3. Avira anti-virus protection
This software is not a resource hog and will perform just as
well as most paid options. It does not have the capability to
scan e-mails. With this, it is advised to run additional software
for e-mails to complete your anti-virus protection.
NOTE: If you have a legit copy of Windows, then you can use
Microsoft Security Essentials. In our opinion it is the best free
anti-virus out there right now, and I would consider using it
before most paid programs in fact. If you insist on a paid
choice - then Kaspersky is the highest rated anti-virus in tech
circles.
Free Programs to Protect Your Computer from
Viruses
Other Free Web Security Programs
SpyBot Search and DestroySpyBot Search and Destroy
This is a software tool designed to find spyware (and other
types of malware) and destroy it. Spyware can do a variety of
nasty things, but at the very least it clogs and slows down your
computer. This program will find it, and destroy it. A tool like
this does require a bit of tech know how.
Malware BytesMalware Bytes
This is the program you turn to when NOTHING else will work.
The free version does a great job of removing spyware and
viruses. One of the benefits of this program is it has a much
better chance of running properly on an infected computer,
than other programs.
How to Tell When Your
Computer is Infected with a
Virus
“Getting infected with an unknown virus is
the last thing that you want to happen. When
your computer is infected, you want to fix it
as soon as possible. Not being able to detect
the virus right away can cause a great
amount of damage, not just on your
computer but also on your important files.”
How to Tell When Your Computer is Infected
with a Virus
Here, are some indications that your computer is
infected:
•If you are using anti-virus software, a notification will give an
update informing you of the threat. As it scans your computer
regularly, it also provides updates like virus detections.
2. If you are not using any anti-virus software, or if the virus
got by your antivirus, there are different indications that your
computer has a virus. Some of them are the following:
•Your computer suddenly becomes unstable.
•Your computer runs slower than usual.
How to Tell When Your Computer is Infected
with a Virus
c. You receive messages informing you that you can’t
access the drives on your computer.
d. You notice that the sizes of your files change even
without modifying or accessing them.
e. If you see that your menus look distorted or odd, that
definitely is a sign of virus.
f. The virus might be bold enough to come right out and tell
you that you are infected.
g. You might lose control of your computer, the screen will
change, mouse will rush around, programs will open etc...
Spotting Online Scams
“There are people who can easily identify
online scams, but those who are still
learning have the tendency to fall for them.
In general, people new to the internet are
more bound to fall for these, but everyday,
even savvy people bite on these scams.”
Spotting Online Scams
If you wish to avoid these traps, here are some simple tips
that can help you:
•Beware of Unknown/Weird Email:Beware of Unknown/Weird Email:
Scammers usually send emails to every e-mail address they can
scrape from the web. Many times you will see that emails have a
random link in them – avoid those. Email scammers these days,
hack people’s email accounts and then send emails to their
address book. This makes the scam look more believable.
2. Do Not Go to Shady Websites:2. Do Not Go to Shady Websites:
If you ever end up on a shady looking website - don’t click any
links and download anything. Close your browser window or
navigate to another site. If you accidentally opened an
unknown site and you notice a pop-up warning, close it or
leave the site immediately.
Spotting Online Scams
3. Beware Downloads:3. Beware Downloads:
We all love downloading stuff, but you have to be careful.
Anything like frostwire or limewire is a breeding ground for
bad files, viruses and spyware. Torrents aren’t much better
these days. Websites like filestube are full of fake downloads
waiting to feast on your computer as well. Even “file locker”
sites like Zshare have been known to spread serious viruses.
4. Too Good to be True?:4. Too Good to be True?:
You know the old adage, if it seems too good to be true, it
probably is. Keep that in mind when navigating the web. If you
see a pop up saying you won a free ipad for doing nothing, or
you are the millionth visitor to a website - click here...avoid the
allure. 99.99% of the time these are hoaxes.
Spotting Online Scams
5. Be Careful With Your Money:5. Be Careful With Your Money:
Don’t toss your money around! Be careful with it. Never ever
send anyone money on the internet who promises to send
you more back. That is an old scam. Don’t sign up for any
free offers that require a credit card either. Why would they
need your credit card if it is a free offer?
“Spotting online scams may sometimes be challenging to
those who are new to using the internet. However, once you
are a little more computer savvy, it will be a piece of cake.
When going online, always practice safety and security for
you never know when you will become the next target.”
Securing Your Wi-Fi
Connection
“One of the biggest internet developments in
recent years has been the explosive
proliferation of Wi-Fi. This explosion of Wi-Fi
makes sense when you see how much more
mobile computing has become.
If you have this wireless internet technology in
your home - you need to keep it secure. An
unsecured Wi-Fi connection is another way
that hackers can attack you.”
Securing Your Wi-Fi Connection
If you use a Wi-Fi internet connection, it is recommended to secure
it with a password. It is strongly suggested, you create a password
so that unauthorized users can’t access it.
If you don’t protect your Wi-Fi connection, you are open to hackers
using your connection for illegal activity.
The first line of defense is a password:The first line of defense is a password:
You will want to log into your router and set up a password. Most
routers have a default password, but it is likely something really
bad like “password”.
Next line of defense; encryption:Next line of defense; encryption:
Unfortunately, most wireless routers don’t have encryption on as a
default. You should enable encryption right away. Use the
strongest version of encryption that your network allows.
Securing Your Wi-Fi Connection
Don’t forget to change your network’s SSID name:Don’t forget to change your network’s SSID name:
Each router will have a name but most of them are something
generic like “default”. Take the time to rename yours to
whatever you want.
Filter MAC Addresses:Filter MAC Addresses:
If you are an advanced user you can even set up your Wi-Fi to
filter by MAC addresses. Every laptop or Wi-Fi enabled mobile
phone has a unique MAC address. You can set up your router
so only certain devices can ever access it.
Internet Security Best
Practices
“In a world where everything can happen
on the web, security is always the first
priority. Everything happens so fast, and
in just one click, you can get what you
want. In spite of this convenience in just
a click, you can get exactly what you don’t
want.”
Internet Security Best Practices
Use Parental ControlsUse Parental Controls
If you have children who use the internet, it is important to set
your parental controls, so they won’t be allowed to access
unauthorized sites.
Secure Your BrowserSecure Your Browser
Your browser is the tool you use to get on the internet. It can
also be your first line of defense. My two favorite are
AdBlockPlus and NoScript. AdBlockPlus will block many
annoying and potentially dangerous ads. NoScript will block
any type of scripts from loading in the background of a
website.
Use Good PasswordsUse Good Passwords
You control your passwords, control them properly.
Internet Security Best Practices
Avoid Nefarious Areas of the WebAvoid Nefarious Areas of the Web
If you are dealing with pornography, or illegal downloads, serial
cracks etc... you better be careful. These areas are bad news
and breeding grounds for viruses and spyware.
Consider Apple ProductsConsider Apple Products
I am not a company shill, and I am not saying the premium price
is worth it, but if you are really word about viruses – get a Mac.
Be Careful With Your Personal InformationBe Careful With Your Personal Information
Unless you want Viagra ads emailed to you 7000 times a day,
you better be careful where you give out your email. Some
online businesses will require this for purchase, and that is OK,
however make sure it is a reputable site.
Internet Security Best Practices
Practice Safe BrowsingPractice Safe Browsing
Do not browse without protection - this comes in the form of an
anti-virus program.
Be Careful With “Toolbars”Be Careful With “Toolbars”
A lot of programs you download will offer you the option of also
installing a toolbar. Avoid these. Even if they don’t include
spyware (and many do) they bog down your browser.
If it is Too Good to be True it Probably isIf it is Too Good to be True it Probably is
The classic adage, it is self explanatory.
Internet Security Best Practices
Be Careful with Thumb DrivesBe Careful with Thumb Drives
Be careful where you use portable thumb drives. If you use
them on an unprotected computer, a virus can copy itself there
and then infect your computer next time you plug it in.
Don’t Open Unsolicited Email AttachmentsDon’t Open Unsolicited Email Attachments
Don’t open any email attachments you didn’t expect coming.
This is a classic way to send viruses.
Run Your Anti-Virus RegularlyRun Your Anti-Virus Regularly
It is important to make sure you find any viruses as soon as
possible. You can usually set it to auto run at times when you
don’t need the computer.
Updates Your Anti-Virus RegularlyUpdates Your Anti-Virus Regularly
Your anti-virus program has a database of known viruses,
and how to fix them. Since new viruses are coming out daily,
this database needs to be updated regularly.
Make Sure Site is Secure Before Giving SensitiveMake Sure Site is Secure Before Giving Sensitive
InformationInformation
Check out the address bar of your web browser, if the site
really is secure there should be an s after the http (https://).
There should also be a lock icon somewhere in the address
bar; this will tell you what level of encryption the site uses.
Internet Security Best Practices
Section Two:
Protecting Your
Website(s)
“Another big aspect of web security is securing your
own websites. This is especially important to people
who work online (like online marketers), but it is
also important for the hobbyist. Basically, anyone
who has a website should take some basic
precautions to ensure security.”
Section Two: Protecting Your Website(s)
How to Properly Back Up Your WebsiteHow to Properly Back Up Your Website
While this may not seem like a “security” step, it is
probably the single most important step you can take
to ensure your website is safe.
Your website will always be somewhat susceptible to a
“worst case scenario”. Having a recent backup is the
only way to 100% ensure you can restore your
website.
Section Two: Protecting Your Website(s)
Backing Up Your Website
Check With Your Host:Check With Your Host:
The first thing you should do is figure out how your host
handles website backups. Check and find out how often they
do automatic backups.
Some premium hosting packages may handle backups for
you. You can still backup yourself to be doubly sure though.
Copy Your Files:Copy Your Files:
A simple step you can take is to back up all of your website
files. The easiest way to do this is to access your site via FTP
and then download the entire public_html folder of your
website.
Backing Up Your Website
Copy Database:Copy Database:
If you are wondering if you have a database or not, remember
any CMS type of web platform (like WordPress) will use a
database.
With most hosting packages (not all) you will have some kind of
control panel to manage your sites. The most commonly used is
cPanel. If you don’t have a control panel, contact your web host
and ask them about backing up MySQL databases.
Export:Export:
This step is for people who use CMS/Blogging platforms for their
websites. Since WordPress (and similar) programs are so
popular, it is worth a mention. This exporting step is also helpful
for those people who host their site on a free host like
WordPress.com or Blogger.
Section Two: Protecting Your Website(s)
There are many third party programs and applications out there
that can help you with backups. There is a world of choices out
there but here are just a few:
WP -> Dropbox Plugin:WP -> Dropbox Plugin:
This simple WordPress plugin will backup your WordPress
installation to DropBox at a specified frequency.
BackupMachine:BackupMachine:
Backup machine offers free backups, as well as a premium
service that will back up your website and database daily.
DropMySite:DropMySite:
This is a very simple, bare bones program that will
automatically backup your site, email and databases into cloud
storage.
Basic Guide to Website
Security Best Practices
“Every online user wants to have a secured
time in online while browsing the web.
Whether you own a website or you are just a
visitor, you should definitely demand safety.
As a business owner, you want to make your
customers feel safe when visiting your site.”
Basic Guide to Website Security Best Practices
If you want to take the basic steps that every webmaster
should, then follow the steps below:
1.1.BackupBackup
See previous section.
2. Assess Third Party Vulnerabilities2. Assess Third Party Vulnerabilities
If you are using any third party website platforms
(WordPress, Joomla, etc...), plugins, themes or other
software, then make sure you assess their vulnerabilities. To
limit your vulnerabilities make sure you have the latest stable
version of any software or scripts you use on your website.
Basic Guide to Website Security Best Practices
3. Choose Good Login Names3. Choose Good Login Names
The login name is another area where you can throw in some
variety to stifle potential hackers. Whether it is a log in name for
your FTP, your database or a WordPress installation make
sure you don’t just stick with the default, something like “admin”
is a bad choice.
4. Choose Good Passwords4. Choose Good Passwords
The same rules for protecting your home computer, apply here.
5. Encrypt Your Database5. Encrypt Your Database
Make sure you use some sort of encryption for any passwordsMake sure you use some sort of encryption for any passwords
that are in a database.that are in a database. If you use WordPress, it encrypts
passwords in your database automatically.
Basic Guide to Website Security Best Practices
6. Turn Off Directory Listings6. Turn Off Directory Listings
By default the directories on your site that don’t have an
index.htm in them, like say an image directory, will display a
list of all files in that folder if someone stumbles across it. To
avoid this, simply throw a blank index.htm into the directory.
7. Access Your Site From Secure Computer7. Access Your Site From Secure Computer
Make sure you access the backend your website from a
computer that is properly secure. Don’t FTP into your website
at the local Starbucks.
Basic Guide to Website Security Best Practices
8. Apache: Mod_Security:8. Apache: Mod_Security:
This is a step for the tech savvy. First thing to consider is some
hosts won’t support this, so check if yours does. If they do - ask
them about setting up the Apache mod_security. This will block
“bad” requests.
“You can never reach 100% security, but this list will help you
avoid the most common and simplest of hacks. The most
important step of course is – back up your website! If the worst
case scenario hits, you will be happy you did!”
Securing Your WordPress
Site With Plugins
“One of the things about WordPress is that it
is Open Source software, so anyone can get
and view all of the code. The bad news -
hackers can scour the code for vulnerabilities.
The good news - 100s of really smart people
are scouring the same code to find and fix
those vulnerabilities first. More good news is
that people create plugins that help you secure
your WordPress website more thoroughly.”
Securing Your WordPress Site With Plugins
WP Security ScanWP Security Scan
This plugin will scan your system and find potential
vulnerabilities. It will then suggest fixes.
AdminSSLAdminSSL
This plugin will force any of your pages that require an
email, to be secure (https://) pages.
TAC – Theme Authenticity CheckerTAC – Theme Authenticity Checker
This plugin will monitor any installed themes you have for
malicious code.
Securing Your WordPress Site With Plugins
Login LockdownLogin Lockdown
This plugin will monitor the IP addresses of anyone trying to
log in to your site. If it records a certain amount of failed
attempts in a certain time frame, it will lock that IP address
down. This helps avoid automated brute force attacks.
Hide LoginHide Login
Hide Login will allow you to move your login page to an URL
that is easier to remember and/or cryptic enough someone
can’t guess it.
AntivirusAntivirus
This plugin will monitor your WordPress site for malware,
exploits and spam injection. Its runs daily.
Securing Your WordPress Site With Plugins
BulletProof SecurityBulletProof Security
The BulletProof Security WordPress plugin is a one click
security solution that creates, copies, renames, moves or
writes to the provided BulletProof Security .htaccess master
files. BulletProof Security protects both your Root website
folder and wp-admin folder with .htaccess website security
protection, as well as providing additional website security
protection.
AkismetAkismet
The classic WordPress comment plugin. It comes with
WordPress installations for a reason - it works and it is
important. Activating this simple plugin will dramatically
reduce the crappy SPAM comments you receive.
Securing Your WordPress Site With Plugins
BackupCreator (PAID)BackupCreator (PAID)
This premium (paid) plugin is the perfect backup solution
for your WordPress blog. It will allow you to easily backup
and restore your entire WordPress installation.
“These plugins won’t make your site impenetrable, but it will
make it much harder to successfully attack. WordPress is a
powerful website platform, but it can be vulnerable to attack
- use these plugins to eliminate those vulnerabilities.”
Conclusion
“Web and website security has never been more
important. Malicious software, spyware, viruses and
SPAM are proliferating at all time highs and more people
are getting infected or hacked because of it.
In order to be safe, you need to be proactive - not
reactive. This guide will help you become proactive.
Making sure you address vulnerabilities before they are
exploited, installing the proper security measures and
creating backups for anything important are all proactive
steps.
Don’t become another online attack statistic. Read the
information, re-read it - and then put the suggestions in
place.”
Thank You
Visit my Blog
marcomoeschter.com
(just click on it)
LEARN HOW YOU CAN PROTECT
YOURSELF AGAINST BRUTEFORCE
ATTACKS, HACKERS, MALICIOUS
SHENANIGANS, AND MUCH MUCH
MORE…
CLICK HERE 46

Más contenido relacionado

Destacado

Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
Recent Hacking Incidents Around The World
Recent Hacking Incidents Around The WorldRecent Hacking Incidents Around The World
Recent Hacking Incidents Around The WorldMaps of World
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking ResourcesStephen Jeske
 

Destacado (15)

Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Web Hacking Intro
Web Hacking IntroWeb Hacking Intro
Web Hacking Intro
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Hacking
HackingHacking
Hacking
 
Android Security
Android SecurityAndroid Security
Android Security
 
Recent Hacking Incidents Around The World
Recent Hacking Incidents Around The WorldRecent Hacking Incidents Around The World
Recent Hacking Incidents Around The World
 
Ebook - The Guide to Master Data Management
Ebook - The Guide to Master Data Management Ebook - The Guide to Master Data Management
Ebook - The Guide to Master Data Management
 
Android security
Android securityAndroid security
Android security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 

Más de 4FingersMedia

Change your thinking change your life
Change your thinking change your lifeChange your thinking change your life
Change your thinking change your life4FingersMedia
 
Do You Have The Right Mindset To Survive In Network Marketing?
Do You Have The Right Mindset To Survive In Network Marketing?Do You Have The Right Mindset To Survive In Network Marketing?
Do You Have The Right Mindset To Survive In Network Marketing?4FingersMedia
 
Important YouTube Events Part I
 Important YouTube Events Part I Important YouTube Events Part I
Important YouTube Events Part I4FingersMedia
 
Case study of MyYearbook.com! A social Site is born!
Case study of MyYearbook.com! A social Site is born!Case study of MyYearbook.com! A social Site is born!
Case study of MyYearbook.com! A social Site is born!4FingersMedia
 
Making Money with Membership Sites
Making Money with Membership Sites Making Money with Membership Sites
Making Money with Membership Sites 4FingersMedia
 
How to use Linkedin For Business Success in 2013
How to use Linkedin For Business Success in 2013How to use Linkedin For Business Success in 2013
How to use Linkedin For Business Success in 20134FingersMedia
 
Building An Online Presence For Your Online Biz!
Building An Online Presence For Your Online Biz!Building An Online Presence For Your Online Biz!
Building An Online Presence For Your Online Biz!4FingersMedia
 
Google plus Revealed! Why you should start using Goggle plus today
Google plus Revealed! Why you should start using Goggle plus todayGoogle plus Revealed! Why you should start using Goggle plus today
Google plus Revealed! Why you should start using Goggle plus today4FingersMedia
 
SEO Roadmap Search Optimization Engine From His Best!
SEO Roadmap Search Optimization Engine From His Best!SEO Roadmap Search Optimization Engine From His Best!
SEO Roadmap Search Optimization Engine From His Best!4FingersMedia
 
New Marketing Tools
New Marketing Tools New Marketing Tools
New Marketing Tools 4FingersMedia
 
New and exciting "Instant Reseller"
New and  exciting  "Instant Reseller"New and  exciting  "Instant Reseller"
New and exciting "Instant Reseller"4FingersMedia
 
3 reasons to use an autoresponder service 2013
3 reasons to use an autoresponder service 20133 reasons to use an autoresponder service 2013
3 reasons to use an autoresponder service 20134FingersMedia
 
You Tube Marketing 5 Secrets Revealed!!
You Tube Marketing 5 Secrets Revealed!!You Tube Marketing 5 Secrets Revealed!!
You Tube Marketing 5 Secrets Revealed!!4FingersMedia
 
Discover The Benefits Of Video Marketing Part II
Discover The Benefits Of Video Marketing Part IIDiscover The Benefits Of Video Marketing Part II
Discover The Benefits Of Video Marketing Part II4FingersMedia
 

Más de 4FingersMedia (14)

Change your thinking change your life
Change your thinking change your lifeChange your thinking change your life
Change your thinking change your life
 
Do You Have The Right Mindset To Survive In Network Marketing?
Do You Have The Right Mindset To Survive In Network Marketing?Do You Have The Right Mindset To Survive In Network Marketing?
Do You Have The Right Mindset To Survive In Network Marketing?
 
Important YouTube Events Part I
 Important YouTube Events Part I Important YouTube Events Part I
Important YouTube Events Part I
 
Case study of MyYearbook.com! A social Site is born!
Case study of MyYearbook.com! A social Site is born!Case study of MyYearbook.com! A social Site is born!
Case study of MyYearbook.com! A social Site is born!
 
Making Money with Membership Sites
Making Money with Membership Sites Making Money with Membership Sites
Making Money with Membership Sites
 
How to use Linkedin For Business Success in 2013
How to use Linkedin For Business Success in 2013How to use Linkedin For Business Success in 2013
How to use Linkedin For Business Success in 2013
 
Building An Online Presence For Your Online Biz!
Building An Online Presence For Your Online Biz!Building An Online Presence For Your Online Biz!
Building An Online Presence For Your Online Biz!
 
Google plus Revealed! Why you should start using Goggle plus today
Google plus Revealed! Why you should start using Goggle plus todayGoogle plus Revealed! Why you should start using Goggle plus today
Google plus Revealed! Why you should start using Goggle plus today
 
SEO Roadmap Search Optimization Engine From His Best!
SEO Roadmap Search Optimization Engine From His Best!SEO Roadmap Search Optimization Engine From His Best!
SEO Roadmap Search Optimization Engine From His Best!
 
New Marketing Tools
New Marketing Tools New Marketing Tools
New Marketing Tools
 
New and exciting "Instant Reseller"
New and  exciting  "Instant Reseller"New and  exciting  "Instant Reseller"
New and exciting "Instant Reseller"
 
3 reasons to use an autoresponder service 2013
3 reasons to use an autoresponder service 20133 reasons to use an autoresponder service 2013
3 reasons to use an autoresponder service 2013
 
You Tube Marketing 5 Secrets Revealed!!
You Tube Marketing 5 Secrets Revealed!!You Tube Marketing 5 Secrets Revealed!!
You Tube Marketing 5 Secrets Revealed!!
 
Discover The Benefits Of Video Marketing Part II
Discover The Benefits Of Video Marketing Part IIDiscover The Benefits Of Video Marketing Part II
Discover The Benefits Of Video Marketing Part II
 

Último

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Protect Your Web Security! Don’t become another online attack statistic!

  • 2. Web SecurityWeb Security “Web security is an important issue, and with a slew of recent hacking attacks, it is that much more essential that you know how to protect yourself. Protecting your personal information and computer is important for ANY internet user. Everyone is a potential victim, and the less you know about protecting yourself, then the more likely you will be a target. Don’t wait to address your web security until you are attacked. At that point it might be too late! When it comes to protecting yourself and your websites, prevention of attacks, is much easier than treatment.”
  • 3. Section One:Section One: PersonalPersonal ProtectionProtection “This section is all about protecting yourself, your computer and your personal information.”
  • 4. Section One: Personal Protection Password Creation & ManagementPassword Creation & Management Password creation and management is one of the first things you should consider when thinking about web security. This is the very base of your pyramid of web security. Knowing how to properly create and manage strong passwords is the perfect place to start the security discussion.
  • 5. Password Creation & Management The following steps will ensure you create great passwords: Avoid The ObviousAvoid The Obvious The first thing you have to do is avoid the obvious. Do not use anything like your name, birthdate or even any of your interests. Don’t choose something that someone could guess! You will also want to avoid the common passwords that every noob uses. The top ten most used passwords list (shown below - courtesy of Huffington Post) then you are a noob! 123456 princess 12345 rockyou 123456789 1234567 Password 12345678 Iloveyou abc123
  • 6. In Fact Don’t Even Use a WordIn Fact Don’t Even Use a Word No matter how clever you think you are - don’t even choose a word - English or foreign. Any word that can be found in the dictionary can be cracked using a brute force attack. Sorry, Size MattersSorry, Size Matters Know it is easier to remember 5 digits than 9, but guess what? Size counts! If you chose a random string of 6 lowercase letters (or worse a 6 letter word) it would take 10 minutes for a hacker to use a brute force attack to figure that password out. Mix Up CharactersMix Up Characters To maximize your password’s security you need to mix up your characters. This means you need to add symbols (%@#), numbers and mix up the case of your letters (capitals and lower case). Password Creation & Management
  • 7. Following are some points you need to consider about HOW to use these great passwords. 1. Have More Than One1. Have More Than One Don’t use the same password everywhere on the web. If you do, you highly increase the chance of having it compromised. If someone is able to glean your password on one site they may be able to put 2 and 2 together, and access other accounts you own. You can break down your passwords into 3 categories: A Level - These are passwords that are super important, and direct access to them could directly lead to financial trouble. (i.e. Online Banking or Paypal) Password Creation & Management
  • 8. B Level - These passwords are also important, and while getting hacked could cause trouble, the hacker won’t be able to clear a bank account, or run up credit. (i.e. eMail, Twitter or Facebook) C Level - These passwords are for random free accounts online. (i.e. Message Board, Blog Comments or Fantasy Sports) “You can also make your own categories if you want. Use your own common sense when deciding which category a password would fit in.” Password Creation & Management
  • 9. 2. Change Password if Compromised2. Change Password if Compromised If you ever have your password compromised - then you need to change it ASAP. Not only do you have to change the compromised password, you also have to change all of the other accounts tied to that password. 3. Don’t Be Afraid to Use Software3. Don’t Be Afraid to Use Software For people who have a whole bunch of passwords, you can consider using software for password management. There is paid software that can help you out. “If you follow these three tips, your passwords will be managed about as well as they can be. Remember, even if you haven’t been compromised, you should still consider changing your password every 6 months or so. This might seem like a hassle, but it will help ensure your online safety.” Password Creation & Management
  • 10. Free Programs to ProtectFree Programs to Protect Your Computer fromYour Computer from VirusesViruses “Speaking of prevention, anyone who is planning to surf the web, should make sure they have some security software installed BEFORE they go online. At the very least a good virus protection program should be running. The good news is there are great free programs to do just that!”
  • 11. Free Programs to Protect Your Computer from Viruses Best Free Anti Virus Programs 1. AVG anti-virus protection1. AVG anti-virus protection This software is simple to use and effective. The installation instructions are so easy that even a “non-techie” can do. It was also rated to be the top program when it comes to detection of threats as determined by independent testing laboratories. 2. Avast anti-virus protection2. Avast anti-virus protection It has the maximum protection for your computer and the technology it uses can be tailored by the user. It also provides a comprehensive filter and reliable website ratings. Its unique features are media player, root kit detection and built-in spyware.
  • 12. Best Free Anti Virus Programs 3. Avira anti-virus protection This software is not a resource hog and will perform just as well as most paid options. It does not have the capability to scan e-mails. With this, it is advised to run additional software for e-mails to complete your anti-virus protection. NOTE: If you have a legit copy of Windows, then you can use Microsoft Security Essentials. In our opinion it is the best free anti-virus out there right now, and I would consider using it before most paid programs in fact. If you insist on a paid choice - then Kaspersky is the highest rated anti-virus in tech circles.
  • 13. Free Programs to Protect Your Computer from Viruses Other Free Web Security Programs SpyBot Search and DestroySpyBot Search and Destroy This is a software tool designed to find spyware (and other types of malware) and destroy it. Spyware can do a variety of nasty things, but at the very least it clogs and slows down your computer. This program will find it, and destroy it. A tool like this does require a bit of tech know how. Malware BytesMalware Bytes This is the program you turn to when NOTHING else will work. The free version does a great job of removing spyware and viruses. One of the benefits of this program is it has a much better chance of running properly on an infected computer, than other programs.
  • 14. How to Tell When Your Computer is Infected with a Virus “Getting infected with an unknown virus is the last thing that you want to happen. When your computer is infected, you want to fix it as soon as possible. Not being able to detect the virus right away can cause a great amount of damage, not just on your computer but also on your important files.”
  • 15. How to Tell When Your Computer is Infected with a Virus Here, are some indications that your computer is infected: •If you are using anti-virus software, a notification will give an update informing you of the threat. As it scans your computer regularly, it also provides updates like virus detections. 2. If you are not using any anti-virus software, or if the virus got by your antivirus, there are different indications that your computer has a virus. Some of them are the following: •Your computer suddenly becomes unstable. •Your computer runs slower than usual.
  • 16. How to Tell When Your Computer is Infected with a Virus c. You receive messages informing you that you can’t access the drives on your computer. d. You notice that the sizes of your files change even without modifying or accessing them. e. If you see that your menus look distorted or odd, that definitely is a sign of virus. f. The virus might be bold enough to come right out and tell you that you are infected. g. You might lose control of your computer, the screen will change, mouse will rush around, programs will open etc...
  • 17. Spotting Online Scams “There are people who can easily identify online scams, but those who are still learning have the tendency to fall for them. In general, people new to the internet are more bound to fall for these, but everyday, even savvy people bite on these scams.”
  • 18. Spotting Online Scams If you wish to avoid these traps, here are some simple tips that can help you: •Beware of Unknown/Weird Email:Beware of Unknown/Weird Email: Scammers usually send emails to every e-mail address they can scrape from the web. Many times you will see that emails have a random link in them – avoid those. Email scammers these days, hack people’s email accounts and then send emails to their address book. This makes the scam look more believable. 2. Do Not Go to Shady Websites:2. Do Not Go to Shady Websites: If you ever end up on a shady looking website - don’t click any links and download anything. Close your browser window or navigate to another site. If you accidentally opened an unknown site and you notice a pop-up warning, close it or leave the site immediately.
  • 19. Spotting Online Scams 3. Beware Downloads:3. Beware Downloads: We all love downloading stuff, but you have to be careful. Anything like frostwire or limewire is a breeding ground for bad files, viruses and spyware. Torrents aren’t much better these days. Websites like filestube are full of fake downloads waiting to feast on your computer as well. Even “file locker” sites like Zshare have been known to spread serious viruses. 4. Too Good to be True?:4. Too Good to be True?: You know the old adage, if it seems too good to be true, it probably is. Keep that in mind when navigating the web. If you see a pop up saying you won a free ipad for doing nothing, or you are the millionth visitor to a website - click here...avoid the allure. 99.99% of the time these are hoaxes.
  • 20. Spotting Online Scams 5. Be Careful With Your Money:5. Be Careful With Your Money: Don’t toss your money around! Be careful with it. Never ever send anyone money on the internet who promises to send you more back. That is an old scam. Don’t sign up for any free offers that require a credit card either. Why would they need your credit card if it is a free offer? “Spotting online scams may sometimes be challenging to those who are new to using the internet. However, once you are a little more computer savvy, it will be a piece of cake. When going online, always practice safety and security for you never know when you will become the next target.”
  • 21. Securing Your Wi-Fi Connection “One of the biggest internet developments in recent years has been the explosive proliferation of Wi-Fi. This explosion of Wi-Fi makes sense when you see how much more mobile computing has become. If you have this wireless internet technology in your home - you need to keep it secure. An unsecured Wi-Fi connection is another way that hackers can attack you.”
  • 22. Securing Your Wi-Fi Connection If you use a Wi-Fi internet connection, it is recommended to secure it with a password. It is strongly suggested, you create a password so that unauthorized users can’t access it. If you don’t protect your Wi-Fi connection, you are open to hackers using your connection for illegal activity. The first line of defense is a password:The first line of defense is a password: You will want to log into your router and set up a password. Most routers have a default password, but it is likely something really bad like “password”. Next line of defense; encryption:Next line of defense; encryption: Unfortunately, most wireless routers don’t have encryption on as a default. You should enable encryption right away. Use the strongest version of encryption that your network allows.
  • 23. Securing Your Wi-Fi Connection Don’t forget to change your network’s SSID name:Don’t forget to change your network’s SSID name: Each router will have a name but most of them are something generic like “default”. Take the time to rename yours to whatever you want. Filter MAC Addresses:Filter MAC Addresses: If you are an advanced user you can even set up your Wi-Fi to filter by MAC addresses. Every laptop or Wi-Fi enabled mobile phone has a unique MAC address. You can set up your router so only certain devices can ever access it.
  • 24. Internet Security Best Practices “In a world where everything can happen on the web, security is always the first priority. Everything happens so fast, and in just one click, you can get what you want. In spite of this convenience in just a click, you can get exactly what you don’t want.”
  • 25. Internet Security Best Practices Use Parental ControlsUse Parental Controls If you have children who use the internet, it is important to set your parental controls, so they won’t be allowed to access unauthorized sites. Secure Your BrowserSecure Your Browser Your browser is the tool you use to get on the internet. It can also be your first line of defense. My two favorite are AdBlockPlus and NoScript. AdBlockPlus will block many annoying and potentially dangerous ads. NoScript will block any type of scripts from loading in the background of a website. Use Good PasswordsUse Good Passwords You control your passwords, control them properly.
  • 26. Internet Security Best Practices Avoid Nefarious Areas of the WebAvoid Nefarious Areas of the Web If you are dealing with pornography, or illegal downloads, serial cracks etc... you better be careful. These areas are bad news and breeding grounds for viruses and spyware. Consider Apple ProductsConsider Apple Products I am not a company shill, and I am not saying the premium price is worth it, but if you are really word about viruses – get a Mac. Be Careful With Your Personal InformationBe Careful With Your Personal Information Unless you want Viagra ads emailed to you 7000 times a day, you better be careful where you give out your email. Some online businesses will require this for purchase, and that is OK, however make sure it is a reputable site.
  • 27. Internet Security Best Practices Practice Safe BrowsingPractice Safe Browsing Do not browse without protection - this comes in the form of an anti-virus program. Be Careful With “Toolbars”Be Careful With “Toolbars” A lot of programs you download will offer you the option of also installing a toolbar. Avoid these. Even if they don’t include spyware (and many do) they bog down your browser. If it is Too Good to be True it Probably isIf it is Too Good to be True it Probably is The classic adage, it is self explanatory.
  • 28. Internet Security Best Practices Be Careful with Thumb DrivesBe Careful with Thumb Drives Be careful where you use portable thumb drives. If you use them on an unprotected computer, a virus can copy itself there and then infect your computer next time you plug it in. Don’t Open Unsolicited Email AttachmentsDon’t Open Unsolicited Email Attachments Don’t open any email attachments you didn’t expect coming. This is a classic way to send viruses. Run Your Anti-Virus RegularlyRun Your Anti-Virus Regularly It is important to make sure you find any viruses as soon as possible. You can usually set it to auto run at times when you don’t need the computer.
  • 29. Updates Your Anti-Virus RegularlyUpdates Your Anti-Virus Regularly Your anti-virus program has a database of known viruses, and how to fix them. Since new viruses are coming out daily, this database needs to be updated regularly. Make Sure Site is Secure Before Giving SensitiveMake Sure Site is Secure Before Giving Sensitive InformationInformation Check out the address bar of your web browser, if the site really is secure there should be an s after the http (https://). There should also be a lock icon somewhere in the address bar; this will tell you what level of encryption the site uses. Internet Security Best Practices
  • 30. Section Two: Protecting Your Website(s) “Another big aspect of web security is securing your own websites. This is especially important to people who work online (like online marketers), but it is also important for the hobbyist. Basically, anyone who has a website should take some basic precautions to ensure security.”
  • 31. Section Two: Protecting Your Website(s) How to Properly Back Up Your WebsiteHow to Properly Back Up Your Website While this may not seem like a “security” step, it is probably the single most important step you can take to ensure your website is safe. Your website will always be somewhat susceptible to a “worst case scenario”. Having a recent backup is the only way to 100% ensure you can restore your website.
  • 32. Section Two: Protecting Your Website(s) Backing Up Your Website Check With Your Host:Check With Your Host: The first thing you should do is figure out how your host handles website backups. Check and find out how often they do automatic backups. Some premium hosting packages may handle backups for you. You can still backup yourself to be doubly sure though. Copy Your Files:Copy Your Files: A simple step you can take is to back up all of your website files. The easiest way to do this is to access your site via FTP and then download the entire public_html folder of your website.
  • 33. Backing Up Your Website Copy Database:Copy Database: If you are wondering if you have a database or not, remember any CMS type of web platform (like WordPress) will use a database. With most hosting packages (not all) you will have some kind of control panel to manage your sites. The most commonly used is cPanel. If you don’t have a control panel, contact your web host and ask them about backing up MySQL databases. Export:Export: This step is for people who use CMS/Blogging platforms for their websites. Since WordPress (and similar) programs are so popular, it is worth a mention. This exporting step is also helpful for those people who host their site on a free host like WordPress.com or Blogger.
  • 34. Section Two: Protecting Your Website(s) There are many third party programs and applications out there that can help you with backups. There is a world of choices out there but here are just a few: WP -> Dropbox Plugin:WP -> Dropbox Plugin: This simple WordPress plugin will backup your WordPress installation to DropBox at a specified frequency. BackupMachine:BackupMachine: Backup machine offers free backups, as well as a premium service that will back up your website and database daily. DropMySite:DropMySite: This is a very simple, bare bones program that will automatically backup your site, email and databases into cloud storage.
  • 35. Basic Guide to Website Security Best Practices “Every online user wants to have a secured time in online while browsing the web. Whether you own a website or you are just a visitor, you should definitely demand safety. As a business owner, you want to make your customers feel safe when visiting your site.”
  • 36. Basic Guide to Website Security Best Practices If you want to take the basic steps that every webmaster should, then follow the steps below: 1.1.BackupBackup See previous section. 2. Assess Third Party Vulnerabilities2. Assess Third Party Vulnerabilities If you are using any third party website platforms (WordPress, Joomla, etc...), plugins, themes or other software, then make sure you assess their vulnerabilities. To limit your vulnerabilities make sure you have the latest stable version of any software or scripts you use on your website.
  • 37. Basic Guide to Website Security Best Practices 3. Choose Good Login Names3. Choose Good Login Names The login name is another area where you can throw in some variety to stifle potential hackers. Whether it is a log in name for your FTP, your database or a WordPress installation make sure you don’t just stick with the default, something like “admin” is a bad choice. 4. Choose Good Passwords4. Choose Good Passwords The same rules for protecting your home computer, apply here. 5. Encrypt Your Database5. Encrypt Your Database Make sure you use some sort of encryption for any passwordsMake sure you use some sort of encryption for any passwords that are in a database.that are in a database. If you use WordPress, it encrypts passwords in your database automatically.
  • 38. Basic Guide to Website Security Best Practices 6. Turn Off Directory Listings6. Turn Off Directory Listings By default the directories on your site that don’t have an index.htm in them, like say an image directory, will display a list of all files in that folder if someone stumbles across it. To avoid this, simply throw a blank index.htm into the directory. 7. Access Your Site From Secure Computer7. Access Your Site From Secure Computer Make sure you access the backend your website from a computer that is properly secure. Don’t FTP into your website at the local Starbucks.
  • 39. Basic Guide to Website Security Best Practices 8. Apache: Mod_Security:8. Apache: Mod_Security: This is a step for the tech savvy. First thing to consider is some hosts won’t support this, so check if yours does. If they do - ask them about setting up the Apache mod_security. This will block “bad” requests. “You can never reach 100% security, but this list will help you avoid the most common and simplest of hacks. The most important step of course is – back up your website! If the worst case scenario hits, you will be happy you did!”
  • 40. Securing Your WordPress Site With Plugins “One of the things about WordPress is that it is Open Source software, so anyone can get and view all of the code. The bad news - hackers can scour the code for vulnerabilities. The good news - 100s of really smart people are scouring the same code to find and fix those vulnerabilities first. More good news is that people create plugins that help you secure your WordPress website more thoroughly.”
  • 41. Securing Your WordPress Site With Plugins WP Security ScanWP Security Scan This plugin will scan your system and find potential vulnerabilities. It will then suggest fixes. AdminSSLAdminSSL This plugin will force any of your pages that require an email, to be secure (https://) pages. TAC – Theme Authenticity CheckerTAC – Theme Authenticity Checker This plugin will monitor any installed themes you have for malicious code.
  • 42. Securing Your WordPress Site With Plugins Login LockdownLogin Lockdown This plugin will monitor the IP addresses of anyone trying to log in to your site. If it records a certain amount of failed attempts in a certain time frame, it will lock that IP address down. This helps avoid automated brute force attacks. Hide LoginHide Login Hide Login will allow you to move your login page to an URL that is easier to remember and/or cryptic enough someone can’t guess it. AntivirusAntivirus This plugin will monitor your WordPress site for malware, exploits and spam injection. Its runs daily.
  • 43. Securing Your WordPress Site With Plugins BulletProof SecurityBulletProof Security The BulletProof Security WordPress plugin is a one click security solution that creates, copies, renames, moves or writes to the provided BulletProof Security .htaccess master files. BulletProof Security protects both your Root website folder and wp-admin folder with .htaccess website security protection, as well as providing additional website security protection. AkismetAkismet The classic WordPress comment plugin. It comes with WordPress installations for a reason - it works and it is important. Activating this simple plugin will dramatically reduce the crappy SPAM comments you receive.
  • 44. Securing Your WordPress Site With Plugins BackupCreator (PAID)BackupCreator (PAID) This premium (paid) plugin is the perfect backup solution for your WordPress blog. It will allow you to easily backup and restore your entire WordPress installation. “These plugins won’t make your site impenetrable, but it will make it much harder to successfully attack. WordPress is a powerful website platform, but it can be vulnerable to attack - use these plugins to eliminate those vulnerabilities.”
  • 45. Conclusion “Web and website security has never been more important. Malicious software, spyware, viruses and SPAM are proliferating at all time highs and more people are getting infected or hacked because of it. In order to be safe, you need to be proactive - not reactive. This guide will help you become proactive. Making sure you address vulnerabilities before they are exploited, installing the proper security measures and creating backups for anything important are all proactive steps. Don’t become another online attack statistic. Read the information, re-read it - and then put the suggestions in place.”
  • 46. Thank You Visit my Blog marcomoeschter.com (just click on it) LEARN HOW YOU CAN PROTECT YOURSELF AGAINST BRUTEFORCE ATTACKS, HACKERS, MALICIOUS SHENANIGANS, AND MUCH MUCH MORE… CLICK HERE 46