SlideShare a Scribd company logo
1 of 5
securing the e marketing site.
There are ten important steps that will help you to keep secure your e marketing
website:-
Choose a dedicated server over a shared server
To save money, many companies opt to use a shared server to host their site’s files.
This means many different sites are running on the same machine, sharing the
same programs and scripts to run applications that are common to all of the sites—
things like email services or control panels, for example. using a shared server
means it’s a lot easier for someone with malicious intent to gain access to your files,
simply because that hacker has many more gateways to exploit on a shared server
with multiple sites.
While a dedicated server is by no means a silver bullet in website security, it is a
good first step. When you use a dedicated server, your site will have its own
machines with scripts and programs exclusive to your site. This means you can exert
full control over what’s running on your server as well as the level of security
behind your website. A dedicated server allows your company to significantly
reduce the opportunities for your site to be hacked by an outside force and or
made vulnerable by another site’s weak security.
securing the e marketing site.
Check the frequency of security updates and speed of patching
 Server and data security is often a low priority for hosting companies (if it’s even a
priority at all). A hosting company can promise that they run the latest and greatest
in security programs to protect your site’s data, but if they don’t bother to keep all
the programs running on a server up-to-date and patched—and patched quickly—
your site is vulnerable to threats.
 When a software companies sends out a software patch to fix security
vulnerabilities, the patch needs to be deployed quickly, lest a hacker exploit that
vulnerability and bring down your site or steal site data. So when you’re investigating
web hosting companies, it’s important to know how often they check for updates on
programs your server runs and how quickly and regularly they patch security holes. If
your hosting company doesn’t patch quickly, your security policy is effectively
negated.
Don’t run what you don’t need (or shouldn’t have)
 Many web hosting companies offer a number of services to their customers out of
the box; however, every application hosted on your server represents another
opportunity that a hacker can use to break into your site. A number of these
common programs represent large vulnerabilities, including web mail. If your web
host offers a service that you simply don’t need, make sure they are not installed on
your server. In addition, some programs that hosting services common provider are
just a bad idea when it comes to security—for example, unencrypted FTP (file
transfer protocol) is very common but extremely vulnerable to exploitation. Any
company serious about its site’s security should not have unencrypted FTP running
on its server.
securing the e marketing site.
Stay up to date on server-side changes
 When site security is a priority, you can’t have just anyone accessing your site’s
files ad-hoc, because this can compromise your site as well as your customers’
confidential data. You need to have a process in place that dictates and restricts
specifically who can access and modify your site’s files. In addition to a contact
list, there needs to be a policy in place between your company and your hosting
provider that someone on your staff—be it marketing or IT—is notified if and
when there are changes to anything that lives on your server, from website files
to programs and scripts that run in the background.
Know who’s modifying your data and when
 Just as important as knowing what’s been changed on your site is knowing who
made that change and when. A change control system allows for versioning and
tracking of activity—which lets you fix innocuous errors more easily, and also
enables you to track any malicious activity being inflicted on your site.
Remember, it’s not just outside threats that can present a problem to your
site—unauthorized data access or internal changes from employees with less-
than-honest intentions can be an even bigger problem than a hacker from the
outside
securing the e marketing site.
Ensure your data and server’s physical security
 Just as you'd restrict access to your company's confidential files, it’s important
to know how someone could get physical access to your site’s server. Perhaps
your server is frequently patched and has high-level encryption, but are the
doors to the server room locked? Consider hardware end of life, too. What does
your hosting company do with a failed hard drive? If they don’t completely wipe
that hard drive of its data, stealing your customer’s confidential data could be as
easy as going through the trash.
Establish a legal policy on Personally Identifiable Information (PII)
 Data leakages—whether your fault or not—can leave you legally liable.
Complicating the matter is that data protection guidelines vary widely between
jurisdictions and frequently change. In order to protect yourself from a lengthy
legal mess, your company needs to have a Personally Identifiable Information
(PII) protection and responsibility policy stipulated in the legal agreement. Many
hosting companies neglect to mention PII policy in the contract, leaving you (the
customer) legally responsible for stolen customer data, even if it is the hosting
company’s fault.
securing the e marketing site.
Implement code sanitizing on any input fields
 Anywhere a user can input information, there’s potential for abuse through common
attack vectors like a SQL(database) injection, for example. Assume that all input to a
webpage can be malicious in intent—meaning email address fields, drop-down
menus, even text on bulletin boards all present abuse potential. An oft-overlooked
solution is to make sure the input fields on your site sanitize anything coming in,
rendering malicious code useless; however, this isn’t the easiest thing to do. Working
with an experienced and trusted penetration testing company is a great way to spot
potential problems in this area.
Get your site added to list of monitored websites
 Should the worst happen, you want to know as soon as possible. If you add your site
to a malware checking service (such as Sophos WebAlert), you can be quickly
notified should your site become compromised, allowing for quick action and
mitigated impact.
Scan all outgoing campaign emails
 While this won’t help your campaign from being vulnerable from hackers, it will
prevent your campaign from being blacklisted as malicious by others. You don’t want
your campaign’s emails to be deleted by user’s anti-spam devices! To avoid
embarrassment, make sure to thoroughly scan any outgoing emails for embedded
malware before you send them—and run your email through spam checkers to make
sure its content doesn’t set off any red flags in email filtering systems.

More Related Content

What's hot

What are ssl certificate that protects website
What are ssl certificate that protects websiteWhat are ssl certificate that protects website
What are ssl certificate that protects websitejamesbarns729
 
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...Nebraska Library Commission
 
HTTP Server Push Techniques
HTTP Server Push TechniquesHTTP Server Push Techniques
HTTP Server Push TechniquesFolio3 Software
 
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC
 
FOAF+SSL: More then Authentication
FOAF+SSL: More then AuthenticationFOAF+SSL: More then Authentication
FOAF+SSL: More then AuthenticationMilan Stankovic
 

What's hot (6)

What are ssl certificate that protects website
What are ssl certificate that protects websiteWhat are ssl certificate that protects website
What are ssl certificate that protects website
 
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...
NCompass Live: Ad Filters -The Case For and Against Installation on Public Co...
 
HTTP Server Push Techniques
HTTP Server Push TechniquesHTTP Server Push Techniques
HTTP Server Push Techniques
 
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz OstmasterBSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
BSidesROC 2016 - Chaim Sanders - The Life and Times of Hanz Ostmaster
 
FOAF+SSL: More then Authentication
FOAF+SSL: More then AuthenticationFOAF+SSL: More then Authentication
FOAF+SSL: More then Authentication
 
Security
SecuritySecurity
Security
 

Similar to 10 steps to secure your e-marketing site

10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Tips for web security
Tips for web securityTips for web security
Tips for web securitykareowebtech
 
Tips for web security
Tips for web securityTips for web security
Tips for web securitykareowebtech
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfGroovy Web
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityNelsan Ellis
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023BeePlugin
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security pptCheap SSL Coupon Code
 

Similar to 10 steps to secure your e-marketing site (20)

10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Tips for web security
Tips for web securityTips for web security
Tips for web security
 
Tips for web security
Tips for web securityTips for web security
Tips for web security
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Solution Brief
Solution BriefSolution Brief
Solution Brief
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Top Keys to create a secure website
Top Keys to create a secure websiteTop Keys to create a secure website
Top Keys to create a secure website
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 

More from gaurav jain

High level languages representation
High level languages representationHigh level languages representation
High level languages representationgaurav jain
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of compgaurav jain
 
Functional units of computer
Functional units of computerFunctional units of computer
Functional units of computergaurav jain
 
Stored program concept
Stored program conceptStored program concept
Stored program conceptgaurav jain
 
Assembly language
Assembly languageAssembly language
Assembly languagegaurav jain
 
Programming languages
Programming languagesProgramming languages
Programming languagesgaurav jain
 
Comprehensive interventions
Comprehensive interventionsComprehensive interventions
Comprehensive interventionsgaurav jain
 
Personal intervention
Personal interventionPersonal intervention
Personal interventiongaurav jain
 
Od interventions
Od interventionsOd interventions
Od interventionsgaurav jain
 
Interpersonal and group process interventions
Interpersonal and group process interventionsInterpersonal and group process interventions
Interpersonal and group process interventionsgaurav jain
 
Organizational effectiveness
Organizational effectivenessOrganizational effectiveness
Organizational effectivenessgaurav jain
 
Organizational change and development
Organizational change and developmentOrganizational change and development
Organizational change and developmentgaurav jain
 
Definition and nature of organizational development
Definition and nature of organizational developmentDefinition and nature of organizational development
Definition and nature of organizational developmentgaurav jain
 
Service sector and economic, growth
Service sector and economic, growthService sector and economic, growth
Service sector and economic, growthgaurav jain
 
Service concept, characteristic and classification
Service concept, characteristic and classificationService concept, characteristic and classification
Service concept, characteristic and classificationgaurav jain
 
Relationship marketing concept, process and importance
Relationship marketing concept, process and importanceRelationship marketing concept, process and importance
Relationship marketing concept, process and importancegaurav jain
 
Marketing for non profit organizations
Marketing for non profit organizationsMarketing for non profit organizations
Marketing for non profit organizationsgaurav jain
 
Creating and delivering services
Creating and delivering servicesCreating and delivering services
Creating and delivering servicesgaurav jain
 
Ongoing customer communication in e marketing
Ongoing customer communication in e marketingOngoing customer communication in e marketing
Ongoing customer communication in e marketinggaurav jain
 

More from gaurav jain (20)

High level languages representation
High level languages representationHigh level languages representation
High level languages representation
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of comp
 
Functional units of computer
Functional units of computerFunctional units of computer
Functional units of computer
 
Stored program concept
Stored program conceptStored program concept
Stored program concept
 
Assembly language
Assembly languageAssembly language
Assembly language
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
Comprehensive interventions
Comprehensive interventionsComprehensive interventions
Comprehensive interventions
 
Personal intervention
Personal interventionPersonal intervention
Personal intervention
 
Od interventions
Od interventionsOd interventions
Od interventions
 
Interpersonal and group process interventions
Interpersonal and group process interventionsInterpersonal and group process interventions
Interpersonal and group process interventions
 
Organizational effectiveness
Organizational effectivenessOrganizational effectiveness
Organizational effectiveness
 
Organizational change and development
Organizational change and developmentOrganizational change and development
Organizational change and development
 
Definition and nature of organizational development
Definition and nature of organizational developmentDefinition and nature of organizational development
Definition and nature of organizational development
 
Change agent
Change agentChange agent
Change agent
 
Service sector and economic, growth
Service sector and economic, growthService sector and economic, growth
Service sector and economic, growth
 
Service concept, characteristic and classification
Service concept, characteristic and classificationService concept, characteristic and classification
Service concept, characteristic and classification
 
Relationship marketing concept, process and importance
Relationship marketing concept, process and importanceRelationship marketing concept, process and importance
Relationship marketing concept, process and importance
 
Marketing for non profit organizations
Marketing for non profit organizationsMarketing for non profit organizations
Marketing for non profit organizations
 
Creating and delivering services
Creating and delivering servicesCreating and delivering services
Creating and delivering services
 
Ongoing customer communication in e marketing
Ongoing customer communication in e marketingOngoing customer communication in e marketing
Ongoing customer communication in e marketing
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

10 steps to secure your e-marketing site

  • 1. securing the e marketing site. There are ten important steps that will help you to keep secure your e marketing website:- Choose a dedicated server over a shared server To save money, many companies opt to use a shared server to host their site’s files. This means many different sites are running on the same machine, sharing the same programs and scripts to run applications that are common to all of the sites— things like email services or control panels, for example. using a shared server means it’s a lot easier for someone with malicious intent to gain access to your files, simply because that hacker has many more gateways to exploit on a shared server with multiple sites. While a dedicated server is by no means a silver bullet in website security, it is a good first step. When you use a dedicated server, your site will have its own machines with scripts and programs exclusive to your site. This means you can exert full control over what’s running on your server as well as the level of security behind your website. A dedicated server allows your company to significantly reduce the opportunities for your site to be hacked by an outside force and or made vulnerable by another site’s weak security.
  • 2. securing the e marketing site. Check the frequency of security updates and speed of patching  Server and data security is often a low priority for hosting companies (if it’s even a priority at all). A hosting company can promise that they run the latest and greatest in security programs to protect your site’s data, but if they don’t bother to keep all the programs running on a server up-to-date and patched—and patched quickly— your site is vulnerable to threats.  When a software companies sends out a software patch to fix security vulnerabilities, the patch needs to be deployed quickly, lest a hacker exploit that vulnerability and bring down your site or steal site data. So when you’re investigating web hosting companies, it’s important to know how often they check for updates on programs your server runs and how quickly and regularly they patch security holes. If your hosting company doesn’t patch quickly, your security policy is effectively negated. Don’t run what you don’t need (or shouldn’t have)  Many web hosting companies offer a number of services to their customers out of the box; however, every application hosted on your server represents another opportunity that a hacker can use to break into your site. A number of these common programs represent large vulnerabilities, including web mail. If your web host offers a service that you simply don’t need, make sure they are not installed on your server. In addition, some programs that hosting services common provider are just a bad idea when it comes to security—for example, unencrypted FTP (file transfer protocol) is very common but extremely vulnerable to exploitation. Any company serious about its site’s security should not have unencrypted FTP running on its server.
  • 3. securing the e marketing site. Stay up to date on server-side changes  When site security is a priority, you can’t have just anyone accessing your site’s files ad-hoc, because this can compromise your site as well as your customers’ confidential data. You need to have a process in place that dictates and restricts specifically who can access and modify your site’s files. In addition to a contact list, there needs to be a policy in place between your company and your hosting provider that someone on your staff—be it marketing or IT—is notified if and when there are changes to anything that lives on your server, from website files to programs and scripts that run in the background. Know who’s modifying your data and when  Just as important as knowing what’s been changed on your site is knowing who made that change and when. A change control system allows for versioning and tracking of activity—which lets you fix innocuous errors more easily, and also enables you to track any malicious activity being inflicted on your site. Remember, it’s not just outside threats that can present a problem to your site—unauthorized data access or internal changes from employees with less- than-honest intentions can be an even bigger problem than a hacker from the outside
  • 4. securing the e marketing site. Ensure your data and server’s physical security  Just as you'd restrict access to your company's confidential files, it’s important to know how someone could get physical access to your site’s server. Perhaps your server is frequently patched and has high-level encryption, but are the doors to the server room locked? Consider hardware end of life, too. What does your hosting company do with a failed hard drive? If they don’t completely wipe that hard drive of its data, stealing your customer’s confidential data could be as easy as going through the trash. Establish a legal policy on Personally Identifiable Information (PII)  Data leakages—whether your fault or not—can leave you legally liable. Complicating the matter is that data protection guidelines vary widely between jurisdictions and frequently change. In order to protect yourself from a lengthy legal mess, your company needs to have a Personally Identifiable Information (PII) protection and responsibility policy stipulated in the legal agreement. Many hosting companies neglect to mention PII policy in the contract, leaving you (the customer) legally responsible for stolen customer data, even if it is the hosting company’s fault.
  • 5. securing the e marketing site. Implement code sanitizing on any input fields  Anywhere a user can input information, there’s potential for abuse through common attack vectors like a SQL(database) injection, for example. Assume that all input to a webpage can be malicious in intent—meaning email address fields, drop-down menus, even text on bulletin boards all present abuse potential. An oft-overlooked solution is to make sure the input fields on your site sanitize anything coming in, rendering malicious code useless; however, this isn’t the easiest thing to do. Working with an experienced and trusted penetration testing company is a great way to spot potential problems in this area. Get your site added to list of monitored websites  Should the worst happen, you want to know as soon as possible. If you add your site to a malware checking service (such as Sophos WebAlert), you can be quickly notified should your site become compromised, allowing for quick action and mitigated impact. Scan all outgoing campaign emails  While this won’t help your campaign from being vulnerable from hackers, it will prevent your campaign from being blacklisted as malicious by others. You don’t want your campaign’s emails to be deleted by user’s anti-spam devices! To avoid embarrassment, make sure to thoroughly scan any outgoing emails for embedded malware before you send them—and run your email through spam checkers to make sure its content doesn’t set off any red flags in email filtering systems.