Keep your website secure from exploit kits and hacker attacks (Video)

website-securityModern businesses need a secure, reliable website to conduct e-commerce and communicate with customers and anyone else who might be looking for them online. But many small business websites are especially vulnerable to hacker attacks.

In this short video, James Lyne, Global Head of Security Research at Sophos, shows you how hackers can attack your website, and he explains how to use a web application firewall to block attacks on your web server.

The problem of hacked websites often goes undetected. Websites that become compromised typically redirect visitors to malware exploit kits, which then infect users through drive-by downloads.

“Over 30,000 legitimate, small business websites are hacked every single day,” James says.

Suffering a cyber attack that knocks out your website could be extremely costly: in terms of lost business (up to $3.4 million in lost business for every hour, according to the Ponemon Institute); and in the case of a data breach (averaging $5.4 million per data breach in the U.S.).

Watch the video to see James hack a sample website, and see what happens when a victim computer is compromised by fake antivirus malware. James also explains that using secure coding practices and a web application firewall can keep your website safe.

 

Web Application Firewall

Our Web Application Firewall intercepts traffic to your servers using a reverse proxy with dual scanning engines and attack pattern recognition.

  • Protects your web servers from tampering and hacking attempts
  • Secures web applications against over 350 different attack patterns
  • Stops website attacks including SQL injection, cross-site scripting, directory traversal and malicious uploads

8 thoughts on “Keep your website secure from exploit kits and hacker attacks (Video)

  1. Pingback: UTM and next-gen firewalls: What’s the difference? (Infographic) | Sophos Blog

  2. Pingback: Launching the World of Warbiking tour! First stop: San Francisco | Sophos Blog

  3. Pingback: What’s new in Sophos UTM Accelerated (9.2): #7 – Safer Web Application Firewall | Sophos Blog

  4. Pingback: How malware works: Anatomy of an attack in five stages (Infographic) | Sophos Blog

  5. Pingback: How malware works: Anatomy of a drive-by download web attack (Infographic) | Sophos Blog

  6. Pingback: How safe are London’s Wi-Fi hotspots? See the results of our warbiking ride (Video) | Sophos Blog

  7. Pingback: Make Hacking Harder (Infographic) | ONENAME GLOBAL

  8. Pingback: Week 2 | villeseg

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s