“Which firewall should I use?” is a question that I am frequently asked when I meet businesspeople at conferences and networking events. While it may sound innocuous, this inquiry is, in fact, indicative of a disturbing trend found among both businesspeople and consumers vis-à-vis the security of their valuable and private information: investing [...]





Comments


Written by nirmalablog
3274 days ago

Good article indeed needed!

Its quite interesting to know your security awareness Atish. As Erik asked, could you please be detail, so that it would help others to have an eye on their WP account.



Written by CoachNotesBlog
3274 days ago

Also, if you're concerned about DDOS protection for your site, you could subscribe to one of the resources mentioned in the article.



Written by atishranjan
3274 days ago

Nirmala,

I have detailed Erik about the 2-factor authentication already. Please read all the comments..

If you are talking about wp-admin security.. you can always ask your hosting support to enable or tel the way to do.



Written by erikemanuelli
3276 days ago

I take several measures to secure my online properties.

I think that this should be among the priorities for any internet business owners,

even more if it's generating a good amount of money.

A part of the revenue should be reinvested into security.



Written by juliewolf
3276 days ago

Security is something most do not want to deal with but many will learn the hard way they MUST! I deal with recovering hacked Skype accounts often as well as teaching Skype Safety. What many do not realize is that any hacking likely means malware in your computer and possibly even your website. If not cleaned, they can come back to "bite" you again... and again! Your website is your business identity when its online. Is your website distributing viruses and malware?

That's not good for your business. I have recently read some very good eye opening articles on Smart TVs becoming the new target for cyber criminals, New malware program PoSeidon targets point-of-sale systems, and Stealing Data From Computers Using Heat written by Azgad Security. I even put a link to them on my Skype Hack Recovery ebook page. Its important!

We really must take the time to protect ourselves and our followers. Period!



Written by amabaie
3275 days ago

Once you get hit, you become more sensitized.



Written by CoachNotesBlog
3276 days ago

Steinberg covers some points we don't usually see given enough attention when it comes to information security like taking into account "human issues" and the associated risks of mobile BYOD.



Written by amabaie
3275 days ago

Yup, it's part tech, part psychology - both of company staff and of hackers.



Written by atishranjan
3276 days ago

I am a person who is very particular about security. I even kept 2-factor authentication on every account where this option is available. I even locked my wp-admin directory with password using server security.

I pretty much agree that if you spending for security then use the best technology.



Written by atishranjan
3276 days ago

Facebook also has this but I never used there.

By the way, if you go to my blog's wp-admin you will see, I have locked access to wp-admin directory using server security. That is also a kind of 2 step authentication :-)



Written by erikemanuelli
3276 days ago

Thanks for your explanation, Atish.

Indeed, a good security strategy.

Going to enable it on Gmail, and for any other accounts that allow this system.



Written by atishranjan
3276 days ago

Hello Erik,

For example, I have set 2-factor authentication to my google account. Whenever I enter my credentials, it sends a code on my personal mobile phone.

Then, I need to enter that code there on the login page in order to log in.

So, even if someone steals my password, he cannot log into my google account without my phone.



Written by erikemanuelli
3276 days ago

This is interesting, Atish.

Can you elaborate an example of 2-factor authentication?



Written by CoachNotesBlog
3276 days ago

I've just started using 2-factor authentication on some of my accounts. That extra step "costs" time so I delayed doing it (bet others do too). But the cost is well worth it as a preventive measure.



Written by GrowMap
3276 days ago

Most businesses are at risk because they don't have security experts in-house. We can't even keep blogs secure without installing plugins, pop-ups to protect the log-in page, and probably need CDNs, too. Unless a business has someone brilliant in security they need to outsource.



Log in to comment or register here.
Subscribe

Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!