Reset Email Account Passwords After a Website Malware Infection

It’s not uncommon for bad actors to use compromised websites to send large amounts of email spam. This can cause major headaches for website owners — spam can lead to the blacklisting of a web host’s mail server IPs, or the domain na… Continue reading Reset Email Account Passwords After a Website Malware Infection

PCI for SMB: Requirement 12 – Maintain an Information Security Policy

Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessmen… Continue reading PCI for SMB: Requirement 12 – Maintain an Information Security Policy

DDoS Targeting WordPress Search

Have you ever stopped to think about how many resources a search engine has or if your website could handle the same amount of search traffic that Google does?
Search engines play an important role on the internet and with how websites perform. One ma… Continue reading DDoS Targeting WordPress Search

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

Identity governance and administration, or IGA, has suddenly become a front-burner matter at many enterprises. Related: Identity governance issues in the age of digital transformation This is, in large part, because the complexity of business networks … Continue reading BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that… Continue reading The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

How to Choose a Website Security Provider

As more people are creating websites and becoming aware of website security, companies are popping up everywhere to help with the problem. And just like website security plugins, not all website security services are created equal.
Here at Sucuri, we … Continue reading How to Choose a Website Security Provider

Cyber Security Incident Response and Reporting Process

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be t… Continue reading Cyber Security Incident Response and Reporting Process