Security

1 December 2021

There are frequent headlines about companies experiencing a security breach through their website. These threats come in many forms. Hackers exploit weaknesses in code or human nature to gain data to sell or to disrupt the company's online presence as much as possible.

The sign above the doorway you want is performance, not vulnerability.

The costs can come from lost trade, refunding customers, and loss of trust. The latter can be the hardest to recover from, with affected customers likely to spread the word that your website isn't a safe place to transact on.

To avoid and mitigate these risks, you need to assess the impacts of problems, internal and external, with plans for prevention, mitigation and recovery.

Ideally, you make a strong door, with a good lock that works, from the beginning of your website. But some vendors don't talk about security because it's awkward if someone gets caught out. Only security companies get in-depth about security because it's a specialised field. Pride or ignorance shouldn't govern your webspace or how you structure the wall and tools you need to keep the scanners out. New threats and vulnerabilities arise all the time. What TrikeWeb does is stop what is known and try to mitigate against possible new ones.

Most problems result from user error (falling for a phishing scam) or third-party vendor holes. The good news here is that TrikeWeb avoids the latter while helping you ensure you don't goof up the former.

TrikeWeb doesn't use third-party software vendors such as WordPress or Wix. These need constant supervision for updates and patches - they are big targets with colossal client bases, and that's their reality.

Most attempted intrusions are automated bots searching for vulnerabilities in the world's 1.9 billion websites. Think of the phrase "low hanging fruit". Once it finds a vulnerability, the bot can replicate the attack across all sites made with the same code. Any data scraped is correlated with other data and gets auctioned on the 'dark web'.

Blog spamming has been a problem with WP as well. Even hosting providers get hacked because of WP vulnerabilities - losing client email data. TrikeWeb closes the door on all of that by avoiding third-party scripts or vendors. This approach is a big saving for admin time and subsequently money.

The Triad

Information Security is known as the AIC or CIA Triad. The triad looks at threats to Confidentiality, Integrity and Availability, measuring each against their ability to compromise the rest. It is vital to mitigate threats to ensure your brand's and your client's security. Intrusions can affect your Site and your Social Media. And, because you're active on both, they are targets for malpractice.

Defence in Depth

If you want to include a third party vendor (and that's always possible with IoT), you need a Risk Assessment Plan. Covid has shown the need for you or your clients to have remote access. When necessary, you can implement software like Suricata (Intrusion Detection System) or Authy (Two-Factor Security App).

Credit Cards

This area is known as PCI DSS Compliance. You will usually use a vendor for credit transactions because they're the experts in this field. All banks have PCI DSS Compliance rules. Like health providers, regulations require financial services to secure sensitive information. The financial vendor (such as PayPal) must have this compliance too. Choosing a respected vendor with software that does not reintroduce known weaknesses is vital.

TrikeWeb's Security

Remember the sign above the doorway you want is performance, not vulnerability.

Allow TrikeWeb to build the website properly from the beginning.

Stand with Ukraine
link to top of page