Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe
Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe
Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?
The short answer to that question is nothing. In the New York Times’ attack, the attackers changed the newspapers’ Domain Name System (DNS) records to send visitors to a Syrian website. The same type of thing can very well happen to your business website. For a clearer perspective, let’s get into the specifics of the attack and explain what DNS is.
The perpetrators of the New York Times’ attack targeted the site’s Internet DNS records. To better understand this, know that computers communicate in numbers, whereas we speak in letters. In order for us to have an easy-to-remember destination like nytimes.com, the IP address must be converted to that particular URL through DNS.
Therefore, no matter how big or small a company’s online presence is, every website is vulnerable to the same DNS hacking as the New York Times’ site. The good news is the websites of smaller companies or organizations fly under the radar and rarely targeted. Larger targets like the New York Times, or LinkedIn, which was recently redirected to a domain sales page, are more likely targets.
For now… There is no reason to panic and prioritize securing DNS over other things right now. But there is a belief that DNS vulnerability will be something cybercriminals pick on more often down the road.
Here are a few ways to stay safe
Select a Registrar with a Solid Reputation for Security
Chances are, you purchased your domain name through a reputable registrar like GoDaddy, Bluehost, 1&1, or Dreamhost. Obviously, you need to create a strong password for when you log into the registrar to manage your site’s files. Nonetheless, recent DNS attacks are concerning because they’re far more than the average password hack.
It was actually the security of the registrars themselves that was compromised in recent attacks. The attackers were basically able to change any DNS record in that registrar’s directory. What’s particularly frightening is the registrars attacked had solid reputations. The New York Times, along with sites like Twitter and the Huffington Post, is registered with Melbourne IT. LinkedIn, Craigslist and US Airways are registered with Network Solutions. Both had been believed to be secure.
So what else can be done?
Set Up a Registry Lock & Inquire About Other Optional Security
A registry lock makes it difficult for anyone to make even the most mundane changes to your registrar account without manual intervention by a staff registrar. This likely comes at an additional cost and not every domain registrar has it available.
Ask your registrar about registry locking and other additional security measures like two factor authentication, which requires another verifying factor in addition to your login and password, or IP address dependent logins, which limits access to your account from anywhere outside of one particular IP address.
While adding any of these extra safeguards will limit your ability to make easy account change or access your files from remote locations, it may be a worthwhile price to pay.
You’ve been there…we all have. You are surfing the web when you come upon an amazing site that you just have to be part of. You decide to sign up! The site asks you to create a username and password. Hmmm, how often will you visit this site? You know you won’t remember some arbitrary password so you quickly type in your usual information, keeping it easy to remember for the next time you visit the site. The average person uses greater than twenty log ins on different websites and tend to use and reuse weak passwords website to website. Who can remember all the passwords for all of your accounts anyway? Right? But what you just did, by reusing a weak password, is make it easier for a hacker to access your information and the ability for them to enter a website as you. In 2016, Yahoo was a victim of a cyber attack which allowed hackers to access valuable information from one billion accounts. So now, if your Yahoo account was hacked, and you reuse the same weak passwords, your …
In the business world, where global communications need to happen instantaneously, having unified communications is a crucial tool that is needed for the success of your business.
So what is Unified Communications (UC)? UC refers to a phone or communication system that unifies or integrates multiple communication methods within your business. Now, thinking about your business and your day to day correspondence with employees, customers and even potential customers, you probably communicate in multiple ways. Phone calls, video conferencing, instant messaging, texts, email, fax and a multitude of other routes are common methods in today’s dynamic business environment. Unifying or connecting these methods allows each to be connected or able to “talk” to each other, allowing them to work together, which in the long run makes your business more efficient and productive. It also means having the capability to translate, in real time, both written text and voice communications, that are de…
There’s more than a grain of truth to the saying, “It’s not
a question of if you’ll be a victim of
a data breach, but when!” The chances of your company falling victim to
a data breach is as high as 1 out of 4, which is a lot more likely than your
chances of being struck by lightning.
According to a Ponemon Institute study sponsored by IBM, the
average cost to a company that was involved in a data breach in 2017 was $3.62
million dollars, and the cost per file breached was $158!Those records, which can contain personally
identifiable information, payment methods and/or health care information, can
vary in cost depending on your industry.Healthcare records are the costliest, while research and public records
are the least.According to the study,
these numbers have improved slightly over those of the previous year due to the
increased use of rapid response teams and advance planning. So once a business has been hacked, what happens
to the exposed information? Generally, cyber criminals…