Top 4 Website Security Tips for Development and Hosting

Too many small and medium-sized businesses (SMBs) have a pervasive, persistent delusion: “We’re too small — hackers wouldn’t be interested in us.” But it’s never really been true.

And now, it is demonstrably, statistically not true. The latest Verizon Data Breach Investigations Report (DBIR) found that 43 percent of breaches involved SMB victims. That’s two to four times the percentage of victims in the public sector (16 percent), healthcare (15 percent), and financial (10 percent).

Why I Took the Time to Turn On Two-Factor Authentication

For the past few years, my dad has been encouraging me to turn on two-factor authentication (2FA) on any service that offers it. Having grown up in the social media age, I felt his requests were unwarranted.

I know social media inside and out (and I have a master’s degree to prove it). I have always taken care not to share personal information online that I wouldn’t share in person, and I regularly update my security settings across all my accounts on the internet. So, what was the big deal with turning on two-factor authentication?

Two Interesting Session-Related Vulnerabilities

Sessions are an essential part of most modern web applications. This is why session-related vulnerabilities often have a sizable impact on the overall security of a web application. They frequently allow the impersonation of other users and can have other dangerous side effects.

What Are Session Variables?

For those not familiar with session variables, they are server-side variables whose value is tied to the current session. This means that if a user visits the website, you could store their username in the session variable as they log in and it will be available until the session expires or the user logs out. If another user logs in, that triggers a new session and the session variable will return a different username for that particular user.