{"id":66930,"date":"2021-06-21T17:32:14","date_gmt":"2021-06-21T14:32:14","guid":{"rendered":"https:\/\/www.mywot.com\/blog\/?p=66930"},"modified":"2025-01-07T12:03:31","modified_gmt":"2025-01-07T10:03:31","slug":"website-security-guide","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/website-security-guide","title":{"rendered":"WOT&#8217;s Complete Guide to Website Security"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">What is web security?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Web security is also known as cybersecurity and its definition is; the ability to protect a website or web application through detecting, preventing and responding to any online threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regularly using the Internet in our everyday lives exposes us to various online attacks, in a range of formats and complexities. Therefore, by having web security &#8211; a system of protective measures and protocols in place, we are able to more easily \u2018secure\u2019 our online surroundings from being attacked and hacked.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Common web security vulnerabilities<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Web security vulnerabilities and attacks can be anything from stolen data &#8211; where online thieves hack your data that is stored online, to phishing schemes &#8211; where hackers can trick you into giving them sensitive information to SEO spam which consists of unusual links and pages to drive traffic to malicious websites and everything in between.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What do we mean by anything in between? Well, attacks against websites and apps range from targeted database manipulation to large scale business and enterprise disruption.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some examples of web security vulnerabilities include;<\/span><\/p>\n<ul>\n<li><b>DoS\/DDoS Attacks<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Otherwise known as Denial of Service. This is where through a range of mediums, attackers are able to overload their targeted server or surrounding infrastructure which in turn makes the server slow down and reduce acceptance of incoming requests from legitimate traffic sources.<\/span><\/p>\n<ul>\n<li><b>Data Breaches<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A data breach is a general term when referring to the release of confidential information. These breaches can often be mistakes as well as attacks and can contain anything from highly valuable information to millions of user accounts being exposed.<\/span><\/p>\n<ul>\n<li><b>Memory Corruption<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This type of attack occurs when a location within a memory is changed which results in unexpected behavior in the software.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Web security scanners<\/span><\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-66934 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-websecurity2.png\" alt=\"\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-websecurity2.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-websecurity2-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-websecurity2-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In order to mitigate web security breaches and attacks you need to perform routine scans to check for threats and vulnerabilities. You can run these scans with something called an Open Source Vulnerability Scanner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a tool that assists organizations in identifying and fixing any risks associated with open source software. Once an open source vulnerability scanner finds open source software vulnerabilities, it will be able to help reduce these risks by suggesting fixes through a patch or update.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The importance of web application security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Let\u2019s explain this with an easy to understand example. An organization has a website that\u2019s based on WordPress and thinks that they have all their \u2018ducks in line\u2019 when it comes to web application security. However this organization hasn\u2019t checked security vulnerabilities within their online security, meaning that there could be some issues making it easy to hack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As we already know, content management systems such as WordPress are easy targets and with glitches in the security that this organization may have, they make it easy for cybercriminals to gain access to sensitive and private data and steal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, the importance of web application security is paramount in protecting websites and online services against a vast range of online threats that can exploit vulnerabilities and sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, what can you, or your organization do to make sure you\u2019re protected? You\u2019ll need to have some security tests in place to make sure you\u2019re covered from attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Different types of security tests<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Web security testing aims to find security vulnerabilities in web applications and their configuration. These security tests often involve sending different types of input to initiate errors and make certain systems behave in a certain way, in order to see any security issues that the specific system may, or may not have. The main goal? To ensure that everything within a web application is totally secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So how can you test?<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><b>DAST Test<\/b><span style=\"font-weight: 400;\"> &#8211; A dynamic application security test is an automated application security test that is mainly used for internally facing, low-risk web applications.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Penetration Test <\/b><span style=\"font-weight: 400;\">&#8211; This is a manual web application security test that involves business logic and adversary-based testing, to discover advanced style attacks and is designed for critical applications undergoing major changes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>RASP Test<\/b><span style=\"font-weight: 400;\"> &#8211; Runtime application self protection tests involve a range of technological techniques so that attacks can be monitored as they are conducted and be blocked in real time.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>SAST Test <\/b><span style=\"font-weight: 400;\">&#8211; The static application security test offers both automated and manual testing techniques and is designed to identify bugs without the need to for apps to be \u2018in production\u2019 whilst doing so.<\/span><span style=\"font-weight: 400;\"> Developers are also able to scan source code and systematically find and eliminate software security vulnerabilities with this type of test.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Web application security best practices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While nobody can guarantee 100% security due to very clever tactics and unforeseen circumstances that arise, there are many methods organizations can implement to help reduce the chance of web application issues and problems arising.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve rounded up the best practices to keep in mind when implementing your web application security.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Web Application Inventory<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Many businesses are organized when it comes to knowing what applications they have. However, most probably don\u2019t have a clear idea about which applications they rely on, on a daily basis. Many also have \u2018rogue\u2019 applications running all the time and don\u2019t notice them as they are in the background &#8211; until something goes wrong.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, a business cannot maintain an effective web application security without knowing exactly which applications they use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore performing an inventory and asking questions such as how many applications are there? Where they are located and so on, is important although time consuming. Organizations will also find that many applications are not in use and pointless to keep around.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Create a Blueprint<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Once you have completed your inventory, you need to start staying on top of your web application security. How best to do this? You need to gather your IT security team and develop an in depth, actionable plan that outlines your organization&#8217;s goals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your organization&#8217;s main goal for example is to enhance overall compliance then you need to prioritize which applications need to be secured first and how you will go about testing them. Each security blueprint for each organization will differ depending on the organization&#8217;s infrastructure; however, it should be created down to the smallest details including naming individuals within the organization who are responsible for maintaining web application security best practices on an ongoing basis.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Prioritize Web Applications<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Now that you have your organization&#8217;s inventory and detailed blueprint in place you\u2019ll need to start prioritizing web applications. This is the next, and most logical step to make sure your organization knows what to focus on first and in order to make progress within the process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One idea may be to sort the applications into 3 categories;<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Critical &#8211; Applications that are primarily externally facing and contain user information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Serious &#8211; Internal or external applications that may contain sensitive information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Normal &#8211; Less exposed applications.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Critical applications are the ones that are most likely to be targeted and exploited by cybercriminals which is why it is paramount to manage these first, and then follow on with the rest in order as listed above.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By segmenting applications in this order, you can effectively manage your time and resources by extensively testing critical applications first and use less intensive testing for the serious and normal application categories.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Prioritize Vulnerabilities<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Prior to testing your web applications, your organization needs to make a decision as to which vulnerabilities are worth eliminating and which are not that vulnerable right now.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most web applications have lots of vulnerabilities however eliminating them all isn\u2019t really possible and to be honest? Isn\u2019t really worth the work. This is because even after the organization categorizes all their applications according to importance, it will take a lot of time to test them all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regarding how to determine which vulnerabilities are the most important to focus on, it depends on the applications your organization is using and then you\u2019ll need to research and analyze each application to work out the correct security measures to take.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is why you need to limit testing to only those applications with the most harmful vulnerabilities, as you will be able to save valuable time and work quicker.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Restrict Access<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Once your web applications have been assessed, tested and the organization has been able to purge the most problematic vulnerabilities, you\u2019re not entirely in the clear. Every web application has specific privileges and these privileges should be adjusted to enhance overall security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means that web applications should only be accessed by authorized employees who have been cleared to make system changes, otherwise all other employees can accomplish what they need with the permissive settings on most web applications.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Implement Interim Security<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Whether your organization is large or small, it may take weeks or even months to make the necessary changes in your web application security. It\u2019s at precisely this time that your organization may be even more vulnerable to attacks and therefore, it\u2019s important to have other protections in place to reduce the risk of attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One option is to remove some functionality from specific applications as functionality makes applications easier to attack. Another, would be to use a web application firewall to protect your organization against the most dangerous types of attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Throughout the web security best practice process, existing web applications should be continually monitored to ensure that there are no breaches or attacks from hackers or cybercriminals. If your organization or website suffers an attack during this time, identify how it happened, the main cause and then address it before continuing with the process. You should also carefully document such vulnerabilities on a regular basis and see how they are handled so that future occurrences can be dealt with accordingly.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Protect Cookies<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">When addressing an organization\u2019s web application security, it\u2019s important to also consider the use of cookies within best practices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cookies are useful for organizations and users alike as they allow users to be remembered by sites that they visit so that future visits are faster and more personalized. However, cookies also make easy targets for hackers in gaining access to sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, it&#8217;s important to make sure you don\u2019t use cookies to store sensitive or critical information such as users passwords. An organization&#8217;s cookies settings should also have expiration dates to avoid security risks. Additionally you should also consider encrypting information stored in cookies that you use to help with security measures.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Other Web Security Options<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Some immediate web application security&nbsp; &#8220;immediate&#8221; web application security options that you can implement as a website or business owner are;<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">HTTPS &#8211; redirect all HTTP traffic to HTTPS<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Install a content security policy within your organization.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Public key pins<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Strong passwords that include lower and uppercase letters, numbers and symbols<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Web Application Security Training<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">If you own an organization, chances are you have employees that understand the importance of web application security and how it works. However, other employees may only have basic knowledge which could lead to careless mishaps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By educating all employees regarding this matter, they are more likely to sort vulnerabilities themselves and prevent attacks by doing so. Therefore by training employees regarding this matter you can strengthen an organization&#8217;s overall web application process whilst maintaining the best security best practices.&nbsp;<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">WiFi Security<\/span><\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-66937 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-wifisecurity-2.png\" alt=\"\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-wifisecurity-2.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-wifisecurity-2-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-wifisecurity-2-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In this day and age, the need for a WiFi connection has become a real necessity for both our work and personal lives. All the devices we use on a daily basis such as our phones, computers and tablets need to be connected to the internet for us to be productive and get things done.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, when not connected in a safe and secure way, the internet can be a dangerous place that can give cybercriminals access to the most sensitive information.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is a wireless network?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When the Internet first landed, most households and businesses used a lot of cables to connect to the internet. The process was very different from the one we know today, consisting of phone lines, cables and usually only one oversized computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the world advanced, so did technology and it became a basic necessity to have internet access.Wireless networking became the easiest and most affordable way to connect to the world wide web. No cables, no dial up, just one connection that many devices can connect to with a password in a matter of seconds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These Wireless networks, otherwise known as WiFi networks are computer networks that use wireless connections to connect our devices to the internet. However, with millions of people connecting to millions of networks all over the world, comes millions of security threats. So what can we do, especially at home to keep our network safe?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Wireless security protocols<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There have been many wireless security protocols developed to protect home wireless networks, including WEP, WPA, and WPA2. Each one has both strengths and weaknesses of their own however all of them help with preventing hackers and cybercriminals from connecting to your wireless network as they encrypt your private data in real time over the airwaves.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what are the differences?<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>WPA <\/b><span style=\"font-weight: 400;\">&#8211; Otherwise known as <\/span><i><span style=\"font-weight: 400;\">wireless protected access<\/span><\/i><span style=\"font-weight: 400;\">, uses a preshared key (PSK), usually referred to as <\/span><i><span style=\"font-weight: 400;\">WPA Personal<\/span><\/i><span style=\"font-weight: 400;\">, and the Temporal Key Integrity Protocol (TKIP) for encryption.&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>(WPA2)<\/b><span style=\"font-weight: 400;\"> &#8211; This is <\/span><i><span style=\"font-weight: 400;\">wireless protected access 2 <\/span><\/i><span style=\"font-weight: 400;\">which is similar to WPA however, the most significant difference to WPA2 over WPA is the use of the Advanced Encryption Standard (AES) for encryption. The security provided by AES is sufficient (and approved) for use by the U.S. government to encrypt information classified as top secret which means it\u2019s probably good enough for you too&#8230;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>WEP <\/b><span style=\"font-weight: 400;\">&#8211; Stands for <\/span><i><span style=\"font-weight: 400;\">wired equivalent privacy<\/span><\/i><span style=\"font-weight: 400;\">, which was the original encryption protocol developed for wireless networks. It provides, as its name suggests, the same level of security as a wired network would.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">How to keep your home WiFi safe<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Most people only use one measure to keep their home network safe, and that is to set up a password so that neighbors and other people can\u2019t gain access to it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, today we need to take our home WiFi security much more seriously as there are continued risks that cybercriminals could exploit your data and gain access to sensitive information by taking advantage of your network through malicious attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By following these 5 simple steps you\u2019ll be able to increase your home WiFi security and make sure that your network is secure as can be.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Change the name of your network<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The initial step in making your home WiFi security safer is to change the service set identifier (SSID). <\/span><span style=\"font-weight: 400;\">Many WiFi manufacturers give their wireless routers a default SSID, usually the company\u2019s name. Then, when a computer or mobile device with a wireless connection searches for a nearby network, the SSID becomes public, giving hackers and cybercriminals an easier way to break into your network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to throw hackers off their mission and avoid security threats, It is better to change the network\u2019s SSID to something that does not disclose any personal information.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Enable network encryption<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">There is an encryption feature in the majority of wireless routers that by default, come turned off. Turning on your router\u2019s encryption setting is another way to help with securing your network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you receive your router, make sure you turn this feature on immediately. The most recent and effective encryption feature available, and the most efficient is WPA2.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">WPA2 is short for WiFi protected Access 2 and provides stronger data protection and network access control for your router, meaning that you can rely on this feature to ensure that only authorized users can access your wireless network.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Choose a strong password<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This may sound like an obvious one but some mistake it. Every wireless router comes with an already pre-set username and password which is necessary for the initial installation of your router. However, it is very easy for cybercriminals to guess these details especially when they know which manufacturer has provided it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, once installed, be sure to change both the username and password immediately. A good wireless password should be around 20 characters long and a mix between upper and lower case letters, symbols and numbers &#8211; making it hard for cybercriminals to guess.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Disable remote access<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Most of the routers provided for home use allow users to only access their interface from a connected device, however there are some that also allow access from remote systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once this remote system is turned off, malicious cyber criminals won\u2019t be able to access your router&#8217;s privacy settings from a device that isn\u2019t connected to your wireless network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To enable these changes, you need to access the web interface and search for \u2018remote access\u2019 or \u2018remote administration.\u2019<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Install a firewall<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">An internet firewall is designed to protect your computers from harmful attacks. Wireless routers usually have built-in firewalls but these may be turned off when you first receive the router.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure you check that your wireless router\u2019s firewall is turned on, or if your router doesn\u2019t have a firewall installed, make sure you install one on your system to watch out for malicious attacks and to keep your network secure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cyber Security Threats<\/span><\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-66932 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-security-threats.png\" alt=\"\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-security-threats.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-security-threats-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-security-threats-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">As we mentioned previously all of us are subject to cyber security threats as long as we use the internet. Hackers and cybercriminals live among us and through the internet can impose their malicious attacks to gain access to our data, information and other personal details.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These can often be anything from small level or very high level attacks and we need to be as secure as we can be against them both personally and professionally.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why is it necessary to protect from cyber threats?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Protection against cyber threats is vital to us all. In our personal lives, if we\u2019re attacked online cyber criminals can steal our information and in our business lives, these attacks can often cripple businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber threats can result in the theft of valuable and sensitive information, data breaches and can affect how we function, which is why we always need to be protected from them. Question is, what are the main security threats we need to be aware of in order to protect ourselves?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Top 5 network security threats<\/span><\/h2>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Viruses<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The majority of us all know what a computer virus is. Some of us may have even experienced them, as for the everyday Internet user &#8211; the virus is the most common threat. So much so that statistics show that almost <\/span><a href=\"https:\/\/medium.com\/@faizan81\/top-10-common-network-security-threats-explained-6ee50182d4a0#:~:text=Computer%20virus&amp;text=For%20everyday%20Internet%20users%2C%20computer,half%20of%20which%20are%20viruses.\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">33% of household computers<\/span><\/a><span style=\"font-weight: 400;\"> are affected by some type of virus.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Viruses are forms of software that are designed to spread from one computer to another. They are often received by users in email attachments or download links, that once clicked on infect your computer through the systems on your network. Viruses are known to have a range of impacts including sending spam, disabling security settings, corrupting and stealing data from computers including personal information such as passwords, and even going as far as to delete everything on a hard drive.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Trojan Horse<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This security threat is named after the Trojan Horse of ancient Greek History, as it refers to tricking someone into inviting an attacker into a protected area. In technology, this is a type of malware that infiltrates a user\u2019s system looking like a standard piece of software which then lets out harmful code onto the user\u2019s system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Often spread through emails that may appear to be from someone you know, Trojan attacks contain clickable links in the attachments sent that one clicked, and begin downloading malware onto your device. They also come in the form of false advertisements and once inside your system they can retrieve your passwords, hijack your webcam and steal sensitive data.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Spyware\/Adware<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Spyware and\/or adware is designed to track your browsing habit data and based on your searches, show you advertisements and pop-ups.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However there are differences between the two. Spyware is installed on your computer without your knowledge. It can contain keyloggers that record personal and sensitive information making it dangerous because of the high risk of identity theft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whereas, Adware collects data with your consent and a legitimate source of income for companies that allow users to try their software for free, but with advertisements showing while using their service. However, when adware is downloaded without consent, it is considered malicious.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Phishing<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.mywot.com\/blog\/spot-stop-phishing-attacks\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> are those sent in emails. The email involved tricking the recipient into disclosing personal information or downloading malware via a link with a goal of obtaining sensitive data such as passwords, usernames or financial information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over time, these types of attacks have become more prominent and harder to spot, as they look like they come from very legitimate sources. Therefore, if the recipient doesn\u2019t check in detail the email address that the email has been sent from to spot any typos or bizarre addresses, as well as the actual email itself, they will fall victim to such an attack.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Malware<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Malware attacks are designed to target networks or devices to corrupt or \u2018take over\u2019 specific systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals create harmful software that\u2019s installed on someone else\u2019s device without their knowledge to gain access to personal information or to damage the device, usually for financial gain.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile ransomware attacks <\/span><a href=\"https:\/\/us.norton.com\/blog\/malware\/malware-101-how-do-i-get-malware-complex-attacks\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">increased by a third<\/span><\/a><span style=\"font-weight: 400;\"> in 2018 from the previous year. Most of those attacks occurred in the United States.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Online security tips<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Making your online experience a safe one doesn\u2019t take too much effort. The majority of these tips will help keep you and your privacy safe online and are pretty much common sense.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Tips for protecting your privacy<\/span><\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-66933 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-web-security.png\" alt=\"\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-web-security.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-web-security-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-web-security-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Secure browsers<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Most of us use browsers such as Chrome, Safari, Firefox or <\/span><a href=\"https:\/\/www.mywot.com\/blog\/edge-vs-chrome\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Microsoft Edge<\/span><\/a><span style=\"font-weight: 400;\"> on a regular basis. Whilst these browsers are secure there are more ways to improve your security and further protect your privacy, without major changes to your browsing habits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One idea is to make sure you clear out your cookie caches and browser history to prevent ad networks from collecting too much information about you. You can do this by going to \u2018clear cache\u2019 in your browser\u2019s settings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, when you visit a specific website, it will either begin with HTTP or HTTPS. <\/span><span style=\"font-weight: 400;\">The latter option uses a layer of encryption to enable secure communication between a browser and a server. While HTTPS is best used by default in general browsing, when it comes to online purchases it is crucial to protecting your payment details from eavesdropping and theft.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Use complex passwords<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">We can\u2019t help but keep repeating this because it really is that important. Use complex passwords, every single time as it&#8217;s the first line of defense you have in securing your online accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Passwords such as \u2018123456\u2019 are so easily targeted and even with this in mind, <\/span><a href=\"https:\/\/www.zdnet.com\/article\/one-out-of-every-142-passwords-is-123456\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">researchers<\/span><\/a><span style=\"font-weight: 400;\"> found that this is still 1 in every 7 passwords. We understand that such passwords are much easier to remember however, there are now so many tools to help you create and store complex passwords that will keep you more secure &#8211; that there really is no excuse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Password managers are specialized pieces of software used to record your credentials securely so that you have easy access to your online accounts without the need of remembering passwords, as these systems keep everything in one place, accessed through one master password, and use security measures such as encryption to prevent exposure.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Enable two factor authentication<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Two-factor authentication (2FA) is now used by many websites and online services. It adds an extra layer of security to your accounts and services after you have submitted a password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The most common methods are via an SMS message, a biometric marker such as a fingerprint, a PIN number or pattern. Using 2FA does create an additional step to access your accounts and data but will keep your privacy secure.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Safeguard your mobile devices<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Our <\/span><span style=\"font-weight: 400;\">mobile devices can act as a secondary means of protection for your online accounts through two factor authentication, but these endpoints can also be the weak link that completely breaks down your privacy and security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you use Android devices, the open source nature that they use has opened the gates for hackers to search for vulnerabilities in its code. While iOS systems are considered more secure &#8211; they have also been known to have security flaws on occasion.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To make sure your privacy is safe on your mobile device, the first and easiest way to do this is to accept security updates that come through to them. These patches resolve new bugs and flaws, as well as provide performance fixes, which will help keep your device from being exploited by cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, although it sounds simple, many of us still don\u2019t do it &#8211; lock your phone. This will help to prevent any physical compromises too.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Connect securely<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">As we mentioned earlier in this article, home WiFi networks can be a bit risky. However, public WiFi networks, while convenient, may include a privacy and security risk if you choose to use one while away from home.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why? It\u2019s simple. As you don\u2019t need any form of authentication to access them, neither do cybercriminals, which in turn gives them the opportunity to perform what is known as Man-in-the-Middle (MiTM) attacks. These attacks enable cybercriminals to eavesdrop on your online activity and steal your information as well as send you to malicious websites.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, cybercriminals may be able to access the information you are sending through the WiFi network, including emails, financial information, and account credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While It\u2019s best not to use a public, unsecured WiFi connection at all, sometimes we need it. With WOT you can check the security of a network before you connect to it for better peace of mind.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to protect your online security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Online security is a huge problem for us all. As we\u2019ve made clear &#8211; making sure you are protected isn\u2019t a want, it\u2019s a need. Make sure you take into account all the tips and information provided within this article to keep your security online in place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The final tips we have for you to protect your online security are;<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Back up important data<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">A backup is a copy of your digital files. A backup can protect you from losing your data and other important information you want to keep from digital devices should anything happen to them.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are two types of backup;<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Sync (or cloud) services backup<\/b><span style=\"font-weight: 400;\"> individual files and do not include applications or programs. Google Drive and Box are examples of a sync service.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Traditional backups<\/b> <span style=\"font-weight: 400;\">allow for a full system restore including all programs, applications, settings, and files. Setting up an external hard drive with a backup program will backup your apps and data files, and enable a full system restore should you need it.<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Don\u2019t leave devices unattended<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">All this talk about online and digital may make us forget that the physical security of our devices is just as important as their technical security. Therefore if you need to leave your mobile digital device or laptop somewhere out of sight for a period of time, make sure they are locked with a password or pattern so that nobody can gain access to them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Likewise, when using a desktop computer, make sure your screen is locked or shut down when not in use or when you finish your work.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Careful what you click<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Due to all the security issues that come with using the internet, make sure you avoid visiting and browsing unknown websites or downloading software from sources that you may not be able to fully trust. These types of websites often host malware that will automatically install (often silently) and compromise your computer. If attachments or links in the email are unexpected or suspicious for any reason, don&#8217;t click on it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now that you have all the web security information you need, make sure that you stay safe while using the world wide web by implementing the tips provided, and with <\/span><a href=\"https:\/\/www.mywot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">WOT<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"> Join the millions of people around the world who make up the <\/span><a href=\"https:\/\/www.mywot.com\/community\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">WOT community<\/span><\/a><span style=\"font-weight: 400;\"> and help make the web a safer place!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is web security? Web security is also known as cybersecurity and its definition is; the ability to protect a website or web application through detecting, preventing and responding to any online threats. Regularly using the Internet in our everyday lives exposes us to various online attacks, in a range of formats and complexities. Therefore, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":66931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[39],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WOT&#039;s Complete Guide to Website Security | WOT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/website-security-guide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WOT&#039;s Complete Guide to Website Security | WOT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/website-security-guide\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T14:32:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:03:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-privacy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"475\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aleksandra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleksandra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide\"},\"author\":{\"name\":\"Aleksandra\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4\"},\"headline\":\"WOT&#8217;s Complete Guide to Website Security\",\"datePublished\":\"2021-06-21T14:32:14+00:00\",\"dateModified\":\"2025-01-07T10:03:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide\"},\"wordCount\":4716,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Safe Browsing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/website-security-guide#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide\",\"url\":\"https:\/\/www.mywot.com\/blog\/website-security-guide\",\"name\":\"WOT's Complete Guide to Website Security | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2021-06-21T14:32:14+00:00\",\"dateModified\":\"2025-01-07T10:03:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/website-security-guide\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/website-security-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WOT&#8217;s Complete Guide to Website Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4\",\"name\":\"Aleksandra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g\",\"caption\":\"Aleksandra\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WOT's Complete Guide to Website Security | WOT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/website-security-guide","og_locale":"en_US","og_type":"article","og_title":"WOT's Complete Guide to Website Security | WOT","og_url":"https:\/\/www.mywot.com\/blog\/website-security-guide","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2021-06-21T14:32:14+00:00","article_modified_time":"2025-01-07T10:03:31+00:00","og_image":[{"width":800,"height":475,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2021\/06\/Blog-Image-blue-privacy.png","type":"image\/png"}],"author":"Aleksandra","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Aleksandra","Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/website-security-guide#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/website-security-guide"},"author":{"name":"Aleksandra","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4"},"headline":"WOT&#8217;s Complete Guide to Website Security","datePublished":"2021-06-21T14:32:14+00:00","dateModified":"2025-01-07T10:03:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/website-security-guide"},"wordCount":4716,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Safe Browsing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/website-security-guide#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/website-security-guide","url":"https:\/\/www.mywot.com\/blog\/website-security-guide","name":"WOT's Complete Guide to Website Security | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2021-06-21T14:32:14+00:00","dateModified":"2025-01-07T10:03:31+00:00","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/website-security-guide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/website-security-guide"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/website-security-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"WOT&#8217;s Complete Guide to Website Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4","name":"Aleksandra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g","caption":"Aleksandra"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66930"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=66930"}],"version-history":[{"count":10,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66930\/revisions"}],"predecessor-version":[{"id":68114,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66930\/revisions\/68114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/66931"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=66930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=66930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=66930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}