Stay Stress-Free on Cyber Monday by Safeguarding Your Site

    Slide Show

    Six Tips to Prepare Online Retail Servers for Cyber Monday

    Follow these important server maintenance tips or risk losing bumper sales on Cyber Monday.

    With Thanksgiving less than a week away, it means that Cyber Monday is right around the corner. Shoppers are going to be hitting online retailers to find the biggest deals and hackers are going to be hitting shoppers with malware scams.

    Thankfully, it’s not too late to take precautions against DDoS attacks and to check your website for vulnerabilities. In a recent post, our own Sue Marquette Poremba listed a few tips from Corero Network Security to help you build a strong defense against hackers. After all, the last thing you want is for your site to go down on one of the busiest online shopping days of the year.

    And, of course, we have tons of resources in our IT Downloads library that can help you put proper measures into place to safeguard your site and to prepare for the holiday rush. You’ll find recommendations for protecting your DNS servers from DoS threats, as well as methods for minimizing DNS information leakage. There’s also a guide for conducting information security assessments so you can start off Cyber Monday on good footing.

    Protecting DNS Servers from Denial of Service Threats: Distributed denial of server (DDoS) using spoofed recursive DNS requests are on the rise. These recommendations can help prevent DNS-based attacks, as well as cache poisoning.

    Minimizing Information Leakage in the DNS: Signature-based DNS security extensions have given hackers a way to scope out information on networks before they begin a direct attack. This paper looks at methods for mitigating this risk while still using DNSSEC to augment Internet security.

    Technical Guide to Information Security Testing and Assessment: This guide explains the basic technical aspects of conducting information security assessments, from technical testing and examination methods and techniques to insights on the potential impact they may have on systems and networks.

    Latest Articles