Your Customer's Data is More Important than Your Company

Discover why customer data security surpasses company value. Learn essential tips for encryption, safeguarding against login attacks, and adopting proactive security measures to protect your business and customer trust. Click to enhance your data protection strategy.

If your customer's data is compromised, you might as well kiss your company goodbye.  Or you know, if you're the Equifax CEO, sell $2M worth of shares before disclosing the data breach.

stock_downfall

I'll touch on 2 major vulnerabilities you can address when building your web app / website.  I'm certainly no expert in security, but I spent a few years doing backend development for a cloud security startup called Mojave Networks that was later acquired by a Gartner leading security company, Sophos.

Encryption

encrypt.png

Encrypting is "the process of converting information or data into a code, especially to prevent unauthorized access."Let's start by talking about encryption in transit.  This is the most common use of encryption and essentially means data is encrypted before being sent over the wire in case someone is sniffing the wire or intercepting packets.  Most websites nowadays support HTTPS over port 443, vs HTTP over port 80.  The 'S' stands for secure because your web client/browser and the server will negotiate an encryption algorithm and obfuscate all data before sending it.  It looks something like this in the browser:

Screen Shot 2017-09-08 at 7.51.34 PM.png

Assuming you can trust the host, by validating the top-level certificate authority for the certificate being presented by the server, you can rest knowing your data is going to the correct person and is encrypted.  A relatively uncommon attack is a man-in-the-middle attack (MITM) where a malicious server gets in between a client and the destination and acts as the destination to intercept the data.  This is a topic for another day.When should you encrypt?Anytime data is sent over the wire - even on internal networks.  As more and more companies are moving their architecture to shared racks they are also inevitably introducing additional vulnerabilities, unless they take proper precautions of course.On shared networks it's possible that an attacker is living on the same internal network as you.  By shared networks I mean servers running on shared racks such as AWS, Digital Ocean, Azure, etc..How Should you EncryptEncrypt on the frontend by using a globally trusted certificate authority (CA) to sign a certificate with a common name (CN) that matches your domain.You should force users to use the HTTPS version of your site by redirecting from HTTP.  Allowing unencrypted traffic is a big "no no" and can lead to credentials being intercepted if you have login forms.  Example:

Screen Shot 2017-09-08 at 8.13.49 PM.png

Encrypt on the backend using mutual auth.  This means the data is encrypted in transit, but equally as important, it means the servers know who they are talking to since each server contains a keystore and a truststore, thus preventing a MITM attack that is relaying/altering data.What Should you EncryptUnless you have major constraints that don't allow you to easily encrypt data, it's generally good practice to encrypt all data in transit.  You should also get in the habit of encrypt touchy data at rest.  "At rest", meaning in storage, in case one of your servers were compromised.

Login Attacks

There are two types of login attacks you need to watch out for.

  1. Credentials from other sites.  Occasionally other sites will get hacked, and said hackers will then use the credentials to try and log in to your site.  Typically they will try hundreds or thousands of credentials in succession using a botnet.  So, look out for any unusual traffic, and secure your log in form by using a reCAPTCHA form for unrecognized IP addresses.
  2. Brute Force.  Sometimes hackers will just attempt every possible combination, hoping one will work on your site.  Block their traffic by limiting the number of attempts, using reCAPTCHA, or rate-limiting requests at the network level using IPTables or something equivalent.

Don't be the Easiest Target

target.png

I recently sat in on a tech talk by the CEO of Shape Security and he provided a great tip for security in the form of an analogy.  If a bear attacks, you don't need to be the fastest, you just need to be faster than your friend.  Security is a game of cat and mouse.  As developers put more defenses in place, hackers find new ways to poke holes in systems.  By taking these simple steps, you can better hedge yourself against potential hacks.Subscribe to the blog to get more articles like this.Graphics compliments of Freepik

SMM Tips

How to Create an Effective Meme Marketing Strategy

Learn how to create a successful meme marketing strategy and increase engagement with your target audience. Discover tips and tricks from experts in the field and take your social media game to the next level.

Read more
January 9, 2023
Agency Tips

Is It Worth Paying for a Social Media Management Platform?

Discover the benefits of paying for a social media management platform and how it can help your business grow. Compare the features and pricing of different options to find the right fit for your needs. Learn how it can save you time, increase efficiency, and improve your ROI.

Read more
February 24, 2023
Agency Tips

What is the Best ContentCal Alternative?

Are you looking for a ContentCal alternative? Discover the best options and compare their features, pricing, and user reviews to find the right fit for your business. Learn how they can help you streamline your social media management and boost your productivity.

Read more
February 17, 2023
CC in the News

Cloud Campaign Welcomes Christina Mautz to Advisory Board

Cloud Campaign is proud to welcome Christina Mautz to our advisory board. With extensive experience in marketing and technology, she brings a wealth of knowledge and expertise to the table. Discover how her insights can help your business grow.

Read more
February 27, 2023
CC in the News

Cloud Campaign Welcomes New VP of Engineering Scott McCaskill

We are thrilled to welcome Scott McCaskill as our new VP of Engineering to Cloud Campaign. With years of experience in software development and a passion for innovation, he is sure to help us take our product to the next level. Discover how our team is evolving to serve you better.

Read more
February 16, 2023
Social Media News

Hootsuite Free Plan Sunsetting | Best Hootsuite Alternative

With Hootsuite's free plan sunsetting, it's time to explore alternatives. Discover the best Hootsuite alternative and learn how it can help you manage your social media more efficiently. Compare features, pricing, and reviews to make an informed decision.

Read more
February 8, 2023