SlideShare uma empresa Scribd logo
1 de 48
Website Security Primer
for Digital Marketers
SUCURI WEBINAR
Alycia Mitchell
Digital Marketing Manager
Housekeeping Items
•
•
•
•
•
•
•
WEBINAR PRESENTER
@artdecotech
Alycia Mitchell
Digital Marketing Manager
WEBINAR PRESENTER
A little about me
•
•
•
In this webinar
you will learn:
•
•
•
Marketers are in agreement
Content is King
… so who is guarding the king?
Whose responsibility
is website security?
Those are DDoS bots out there!
LET’S GO MITIGATE THEM!
Source: The T-Shaped Web Marketer by Rand Fishkin
Tweet #AskSucuri to @SucuriSecurity
Jono Alderson, YOAST
The Democratization of SEO
Jono Alderson, YOAST
The Democratization of SEO
Marketing
Nightmares
Hey marketer, want to install this plugin
to increase your SEO rankings?
They all rank organically down here!
Imagine the following scenarios…
Distributed Denial of
Service (DDoS) attacks.
Downtime due to
Blacklist Warnings
by major search engines and
antivirus vendors.
Malicious Redirects
sending mobile visitors to porn websites.
advertisements, phishing pages,
and drive-by downloads.
Malicious
A hacked site can
also affect your
rankings and
search engine
metadata.
Marketers Are Primed to Understand
• Web development languages
• Crawlers and bot behavior
• SSL certificates and HTTPS
• Redirects
• Referral traffic
• IP networking
• Analytics and logs
Tweet #AskSucuri to @SucuriSecurity
Black Hats White Hats
BLACK HAT
Hackers
Exploit security
weaknesses for
malicious purposes.
BLACK HAT
Marketers
Bully people
into buying their
products.
BLACK HAT
Hackers
Exploit security
weaknesses for
malicious purposes.
BLACK HAT
Marketers
Bully people
into buying their
products.
WHITE HAT
Hackers
Identify security
issues so they can
be patched.
WHITE HAT
Marketers
Shine a light on
a problem and
offer solutions.
Privacy and Compliance
• GDPR, CAN-SPAM, CASL – spam laws
• PCI DSS – ecommerce
• “Not Secure” - warnings in Chrome
• SSL as a ranking signal in Google search
Tweet #AskSucuri to @SucuriSecurity
SSL does nothing to protect the website from being attacked.
Don’t get me wrong. Encryption is a good thing. It protects passwords, credit card data, form data...
Tweet #AskSucuri to @SucuriSecurity
Only a WAF can protect the website from being attacked
(see more on this later…)
Tweet #AskSucuri to @SucuriSecurity
Google Safe Browsing Transparency Report
Tweet #AskSucuri to @SucuriSecurity
“Compromised sites:
These are legitimate
websites that have been
hacked to include content
from, or to direct users
to, sites that may exploit
their browsers.
For example, a page of a
site may be compromised
to include code that
redirects a user to an
attack site.”
The internet is getting more complex.
Tweet #AskSucuri to @SucuriSecurity
Bots API Plugin Scripts
We can hope that white hats
will find the vulnerabilities first.
We can also take steps to
prevent a compromise.
Here’s
Vulnerability!
What is
Website Security?
•
•
•
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
Monitor and Audit
Your Web Properties
Marketers know logs and monitoring are important.
• Spreadsheets, reports, analytics
• Social monitoring and Google Alerts
• Early detection and responsiveness
Now, apply these same concepts to your website
integrity.
Tweet #AskSucuri to @SucuriSecurity
Verify Domain Ownership for Alerts
Tweet #AskSucuri to @SucuriSecurity
Google Search Console
Security Issues section
shows any warnings.
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
Scanning for Malware
and Security Issues
You can scan your website with our
free tool:
sitecheck.sucuri.net
We check for blacklists, outdated
software, code anomalies, and
known malicious payloads.
Note: Remote scanners have limited access and
results are not guaranteed.
Tweet #AskSucuri to @SucuriSecurity
User Access Logging
Do you have a way to know if one
of your website administrators
suddenly logs in from a strange
location at 3AM?
Tweet #AskSucuri to @SucuriSecurity
Guide: How to Use the
WordPress Security Plugin
Sucuri WordPress Plugin
https://wordpress.org/plugins/sucuri-scanner https://sucuri.net/guides/how-to-use-the-wordpress-security-plugin
Tweet #AskSucuri to @SucuriSecurity
Protect Your Website from Attacks
There are two ways websites get hacked:
Tweet #AskSucuri to @SucuriSecurity
Exploiting a
Software Vulnerability
Compromising
User Access Control
Tweet #AskSucuri to @SucuriSecurity
How to Lock Down Access
Stronger Passwords
2FA (Two-Factor Authentication)
Principle of Least Privilege
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
How to Prevent
Vulnerability Exploitation
Apply software updates ASAP
• Patches security holes
• Requires you to be a step ahead of the black hats
Activate a web application firewall
• Blocks zero-day attacks and unpatched vulnerabilities
• Mitigates DDoS attacks
• Backed by security researchers
• Bonus content delivery network (CDN)
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
Creating an Incident
Response Plan
• Backups of everything
• Documented emergency response plan
• Roles and responsibilities
• Vet any vendors before you have an issue
Tweet #AskSucuri to @SucuriSecurity
Tweet #AskSucuri to @SucuriSecurity
Using a backup to
reverse a hacked site?
Make sure you have reliable backups
• Automatic
• Secure off-site storage (never on the same server as your website)
• Redundant copies
• Proven and tested recovery
Be sure to restore a backup from before hacker gained
access, not just before the symptoms showed up.
• Backdoors are often placed weeks in advance of the payload.
• If you restore a copy with a backdoor, you’ll be reinfected.
• 71% of hacked websites contain backdoors.
Tweet #AskSucuri to @SucuriSecurity
Who you gonna call?
• Can your IT team identify the latest PHP or JavaScript malware?
• Who is responsible for getting a hacked site fixed?
• How will you deal with downtime or scared customers?
• Do you know which professionals you would call in a pinch?
• Sucuri offers free DIY guides for cleaning hacked sites and removing blacklist warnings.
Tweet #AskSucuri to @SucuriSecurity
Dealing with
Google Blacklist
• Blacklisted sites lose at least
95% of their traffic.
• Once your site is clean, you
can request a review in
Google Search Console
(Sucuri does this for you).
Tweet #AskSucuri to @SucuriSecurity
Welcome to the club!
• Marketers shouldn’t do this alone, but they should speak up about it.
• By working with the IT counterparts within their company, marketers can
greatly improve the security posture of the brand.
• Marketers should champion these initiatives and get them prioritized by
their business development team.
Tweet #AskSucuri to @SucuriSecurity
In Conclusion
v
Security is everyone’s responsibility
and is inherently tied to trust.
Marketing thrives on
trust – and suffers a
quick death if it is lost.
The internet needs
intelligent and passionate
people to raise awareness.
Marketers are resourceful
enough to step up to the plate.
Q & A
Alycia Mitchell
You can reach me at alycia@sucuri.net

Mais conteúdo relacionado

Mais procurados

Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecuritySucuri
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?Sucuri
 
Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteSucuri
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?Sucuri
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsSucuri
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website TrendsSucuri
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From HacksTony Perez
 
WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014sabinovates
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?Tony Perez
 

Mais procurados (20)

Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress Site
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get Hacked
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! website
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014WP Security - Master Class #SMWLagos2014
WP Security - Master Class #SMWLagos2014
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
 

Semelhante a Sucuri Webinar: Website Security Primer for Digital Marketers

Creating a Safe and Secure Website Experience For You and Your Readers - Tony...
Creating a Safe and Secure Website Experience For You and Your Readers - Tony...Creating a Safe and Secure Website Experience For You and Your Readers - Tony...
Creating a Safe and Secure Website Experience For You and Your Readers - Tony...DesignBloggersConference
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for MarketersHubSpot
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxInfosectrain3
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2WPWhiteBoard
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountDenim Group
 
Don't let your WordPress site get hacked
Don't let your WordPress site get hackedDon't let your WordPress site get hacked
Don't let your WordPress site get hackedVictoria Darling
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101v_raj
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure WebsiteImperva Incapsula
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfArthur Kasirye
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteDeola Kayode
 

Semelhante a Sucuri Webinar: Website Security Primer for Digital Marketers (20)

Pubcon Vegas Session - WordPress Site Security Audits
Pubcon Vegas  Session - WordPress Site Security AuditsPubcon Vegas  Session - WordPress Site Security Audits
Pubcon Vegas Session - WordPress Site Security Audits
 
Creating a Safe and Secure Website Experience For You and Your Readers - Tony...
Creating a Safe and Secure Website Experience For You and Your Readers - Tony...Creating a Safe and Secure Website Experience For You and Your Readers - Tony...
Creating a Safe and Secure Website Experience For You and Your Readers - Tony...
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 
Security testing
Security testingSecurity testing
Security testing
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
Don't let your WordPress site get hacked
Don't let your WordPress site get hackedDon't let your WordPress site get hacked
Don't let your WordPress site get hacked
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdf
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
 

Mais de Sucuri

Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRSucuri
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebSucuri
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website SecuritySucuri
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Sucuri
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaSucuri
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPressSucuri
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Sucuri
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSucuri
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSucuri
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecuritySucuri
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri
 

Mais de Sucuri (14)

Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & Resiliência
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPress
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus Clientes
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & Security
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web Agencies
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
 

Último

Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessAbdulsamad Lukman
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music businessbrjohnson6
 
Crypto Quantum Leap - Digital - membership area
Crypto Quantum Leap -  Digital - membership areaCrypto Quantum Leap -  Digital - membership area
Crypto Quantum Leap - Digital - membership areajaynee G
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsVbout.com
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generationvidhyalakshmiveerapp
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...William (Bill) H. Bender, FCSI
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxDave McCallum
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMaiizennxqc
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escortsmeghakumariji156
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONpratheeshraj987
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesMathuraa
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarhhamitthakurdma01
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendayMaharshBenday
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx23397013
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdfTransports Advertising
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfPiyush Kumar
 
Resumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital StrategistResumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital StrategistKarina Perez
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxelizabethella096
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.Bharathi sakthi
 

Último (20)

Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music business
 
Crypto Quantum Leap - Digital - membership area
Crypto Quantum Leap -  Digital - membership areaCrypto Quantum Leap -  Digital - membership area
Crypto Quantum Leap - Digital - membership area
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered Prompts
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generation
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarh
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
Resumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital StrategistResumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital Strategist
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 

Sucuri Webinar: Website Security Primer for Digital Marketers

  • 1. Website Security Primer for Digital Marketers SUCURI WEBINAR Alycia Mitchell Digital Marketing Manager
  • 4. WEBINAR PRESENTER A little about me • • •
  • 5. In this webinar you will learn: • • •
  • 6. Marketers are in agreement Content is King … so who is guarding the king?
  • 7. Whose responsibility is website security? Those are DDoS bots out there! LET’S GO MITIGATE THEM!
  • 8. Source: The T-Shaped Web Marketer by Rand Fishkin Tweet #AskSucuri to @SucuriSecurity
  • 9. Jono Alderson, YOAST The Democratization of SEO
  • 10. Jono Alderson, YOAST The Democratization of SEO
  • 11. Marketing Nightmares Hey marketer, want to install this plugin to increase your SEO rankings? They all rank organically down here! Imagine the following scenarios…
  • 12. Distributed Denial of Service (DDoS) attacks. Downtime due to
  • 13. Blacklist Warnings by major search engines and antivirus vendors.
  • 14. Malicious Redirects sending mobile visitors to porn websites.
  • 15. advertisements, phishing pages, and drive-by downloads. Malicious
  • 16. A hacked site can also affect your rankings and search engine metadata.
  • 17. Marketers Are Primed to Understand • Web development languages • Crawlers and bot behavior • SSL certificates and HTTPS • Redirects • Referral traffic • IP networking • Analytics and logs Tweet #AskSucuri to @SucuriSecurity
  • 19. BLACK HAT Hackers Exploit security weaknesses for malicious purposes. BLACK HAT Marketers Bully people into buying their products.
  • 20. BLACK HAT Hackers Exploit security weaknesses for malicious purposes. BLACK HAT Marketers Bully people into buying their products. WHITE HAT Hackers Identify security issues so they can be patched. WHITE HAT Marketers Shine a light on a problem and offer solutions.
  • 21. Privacy and Compliance • GDPR, CAN-SPAM, CASL – spam laws • PCI DSS – ecommerce • “Not Secure” - warnings in Chrome • SSL as a ranking signal in Google search Tweet #AskSucuri to @SucuriSecurity
  • 22. SSL does nothing to protect the website from being attacked. Don’t get me wrong. Encryption is a good thing. It protects passwords, credit card data, form data... Tweet #AskSucuri to @SucuriSecurity
  • 23. Only a WAF can protect the website from being attacked (see more on this later…) Tweet #AskSucuri to @SucuriSecurity
  • 24. Google Safe Browsing Transparency Report Tweet #AskSucuri to @SucuriSecurity “Compromised sites: These are legitimate websites that have been hacked to include content from, or to direct users to, sites that may exploit their browsers. For example, a page of a site may be compromised to include code that redirects a user to an attack site.”
  • 25. The internet is getting more complex. Tweet #AskSucuri to @SucuriSecurity Bots API Plugin Scripts
  • 26. We can hope that white hats will find the vulnerabilities first. We can also take steps to prevent a compromise. Here’s Vulnerability!
  • 27. What is Website Security? • • • Tweet #AskSucuri to @SucuriSecurity
  • 28. Tweet #AskSucuri to @SucuriSecurity Monitor and Audit Your Web Properties Marketers know logs and monitoring are important. • Spreadsheets, reports, analytics • Social monitoring and Google Alerts • Early detection and responsiveness Now, apply these same concepts to your website integrity. Tweet #AskSucuri to @SucuriSecurity
  • 29. Verify Domain Ownership for Alerts Tweet #AskSucuri to @SucuriSecurity
  • 30. Google Search Console Security Issues section shows any warnings. Tweet #AskSucuri to @SucuriSecurity
  • 31. Tweet #AskSucuri to @SucuriSecurity Scanning for Malware and Security Issues You can scan your website with our free tool: sitecheck.sucuri.net We check for blacklists, outdated software, code anomalies, and known malicious payloads. Note: Remote scanners have limited access and results are not guaranteed.
  • 32. Tweet #AskSucuri to @SucuriSecurity User Access Logging Do you have a way to know if one of your website administrators suddenly logs in from a strange location at 3AM?
  • 33. Tweet #AskSucuri to @SucuriSecurity Guide: How to Use the WordPress Security Plugin Sucuri WordPress Plugin https://wordpress.org/plugins/sucuri-scanner https://sucuri.net/guides/how-to-use-the-wordpress-security-plugin
  • 34. Tweet #AskSucuri to @SucuriSecurity
  • 35. Protect Your Website from Attacks There are two ways websites get hacked: Tweet #AskSucuri to @SucuriSecurity Exploiting a Software Vulnerability Compromising User Access Control
  • 36. Tweet #AskSucuri to @SucuriSecurity How to Lock Down Access Stronger Passwords 2FA (Two-Factor Authentication) Principle of Least Privilege Tweet #AskSucuri to @SucuriSecurity
  • 37. Tweet #AskSucuri to @SucuriSecurity How to Prevent Vulnerability Exploitation Apply software updates ASAP • Patches security holes • Requires you to be a step ahead of the black hats Activate a web application firewall • Blocks zero-day attacks and unpatched vulnerabilities • Mitigates DDoS attacks • Backed by security researchers • Bonus content delivery network (CDN) Tweet #AskSucuri to @SucuriSecurity
  • 38. Tweet #AskSucuri to @SucuriSecurity Creating an Incident Response Plan • Backups of everything • Documented emergency response plan • Roles and responsibilities • Vet any vendors before you have an issue Tweet #AskSucuri to @SucuriSecurity
  • 39. Tweet #AskSucuri to @SucuriSecurity Using a backup to reverse a hacked site? Make sure you have reliable backups • Automatic • Secure off-site storage (never on the same server as your website) • Redundant copies • Proven and tested recovery Be sure to restore a backup from before hacker gained access, not just before the symptoms showed up. • Backdoors are often placed weeks in advance of the payload. • If you restore a copy with a backdoor, you’ll be reinfected. • 71% of hacked websites contain backdoors. Tweet #AskSucuri to @SucuriSecurity
  • 40. Who you gonna call? • Can your IT team identify the latest PHP or JavaScript malware? • Who is responsible for getting a hacked site fixed? • How will you deal with downtime or scared customers? • Do you know which professionals you would call in a pinch? • Sucuri offers free DIY guides for cleaning hacked sites and removing blacklist warnings.
  • 41. Tweet #AskSucuri to @SucuriSecurity Dealing with Google Blacklist • Blacklisted sites lose at least 95% of their traffic. • Once your site is clean, you can request a review in Google Search Console (Sucuri does this for you).
  • 42. Tweet #AskSucuri to @SucuriSecurity Welcome to the club! • Marketers shouldn’t do this alone, but they should speak up about it. • By working with the IT counterparts within their company, marketers can greatly improve the security posture of the brand. • Marketers should champion these initiatives and get them prioritized by their business development team.
  • 43. Tweet #AskSucuri to @SucuriSecurity In Conclusion
  • 44. v Security is everyone’s responsibility and is inherently tied to trust.
  • 45. Marketing thrives on trust – and suffers a quick death if it is lost.
  • 46. The internet needs intelligent and passionate people to raise awareness.
  • 47. Marketers are resourceful enough to step up to the plate.
  • 48. Q & A Alycia Mitchell You can reach me at alycia@sucuri.net

Notas do Editor

  1. Another joke that is not webinar centric: Hey marketer, want some sales qualified leads? They all convert down here!