SHARE
Facebook X Pinterest WhatsApp

Web Security: Chasing the Moving Target

Data Breach: Who’s to Blame? Recent news on cyberattacks has everyone scrambling to ensure their website isn’t the next victim. The fact is, the attacks never stop coming, and any public-facing website can be attacked—all you can do is put forth your best defenses to protect sacred company data.  In the US-CERT Guide to Website […]

Written By
thumbnail
Kim Mays
Kim Mays
Jul 19, 2013
Slide Show

Data Breach: Who’s to Blame?

Recent news on cyberattacks has everyone scrambling to ensure their website isn’t the next victim. The fact is, the attacks never stop coming, and any public-facing website can be attacked—all you can do is put forth your best defenses to protect sacred company data.  In the US-CERT Guide to Website Security IT Download, you will learn how to reduce your company website’s weaknesses and also how to mitigate damage from an attack should one occur. 

This technical information paper (TIP) covers web server security, including protection of back-end data and the use of SQL services. It explains which applications are necessary and which can be disabled:

… a web server does not require web browsing capability and if a web server is not performing FTP functionality there is no need to have that service running. Removing or disabling any unused components will reduce the attack surface area.

On operating system security, you will find information on how to limit server access and what type of authentication is recommended. This TIP also provides detailed information on how administrators should create a strong password policy, with recommendations on how often it is appropriate to change passwords and how to prevent reuse of passwords.

To further protect the company’s web presence, the paper lists additional web services and applications that can be used, depending upon need, risk and budgeting limitations. The list includes information on:

  • Extensive logging
  • Data service replication
  • Secure software development
  • Demilitarized zones

Arm yourself with the right information to continually improve your site’s security stance and help keep your company’s web presence safe from vulnerabilities or outright attacks.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.