Personal Online Security – Account Management

Continuing a series on how to better strengthen your personal online privacy, we are looking to take personal inventory of how we connect online. These were themes covered during our webinar “Security Beyond Your Website: Personal Online Privacy… Continue reading Personal Online Security – Account Management

Personal Online Privacy – Data & Browser Privacy

Continuing a series on how to strengthen your personal online privacy, we are taking personal inventory of how we connect online. These were themes covered during our webinar on “Security Beyond Your Website: Personal Online Privacy” and d… Continue reading Personal Online Privacy – Data & Browser Privacy

Personal Online Privacy – Connecting Online

When California passed an online privacy law that will take effect on Jan. 1, 2020, it made me think about a user’s responsibility when it comes to how we engage online.
As online privacy starts to become a larger discussion, it’s importan… Continue reading Personal Online Privacy – Connecting Online

Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, most advice can often be too broad; different content management systems (CMS) exist in this ecosystem, and each requires a unique security config… Continue reading Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

Internet Cookies: What Are They and Are They Good or Bad?

Cookies! I LOVE Cookies. Oatmeal raisin are one of my particular favorite flavors.
However, we’re not here to talk about baked goods as much as I’d love to. We’re here to talk about itty bitty little files stored on your local machin… Continue reading Internet Cookies: What Are They and Are They Good or Bad?

How to Create a Website Maintenance Plan & Contract

In my years of experience working alongside agencies, I’ve realized that managed providers and other web pros who offer website maintenance to their clients, have a hard time convincing them on the value of managed services.
It’s a common … Continue reading How to Create a Website Maintenance Plan & Contract

How to Stop a DDoS Attack & Prevent Future Attacks

DDoS attacks are a growing threat for websites. But do you know how to mitigate them in their tracks? We’ll cover some essential fundamentals on stopping a DDoS attack and preventing them from happening in the future.
Specifically, as a webmaste… Continue reading How to Stop a DDoS Attack & Prevent Future Attacks

7 Things You Should Monitor in WordPress Activity Logs

WordPress activity logs can be helpful when troubleshooting or trying to identify a hack. In this article, you’ll learn about the seven things you should monitor in your WordPress logs.
Over the years, WordPress has grown more complex. WordPress… Continue reading 7 Things You Should Monitor in WordPress Activity Logs

PCI for SMB: Requirement 12 – Maintain an Information Security Policy

Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessmen… Continue reading PCI for SMB: Requirement 12 – Maintain an Information Security Policy

PCI for SMB: Requirement 10 & 11 – Regularly Monitor and Test Networks

Welcome to the seventh post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questio… Continue reading PCI for SMB: Requirement 10 & 11 – Regularly Monitor and Test Networks