The Limited Times

Now you can see non-English news...

A lot of online stores have opened too fast lately, and this is a difficult problem - Walla! Business

2020-10-24T23:35:45.699Z


The reorganization and the forced reality forced businesses to set up Bezeq stores, which led to a cyber epidemic of insufficiently secure sites. There are simple steps you can take to protect yourself


  • Business

  • Opinions

A lot of online stores have opened too fast lately, which is a difficult issue

The reorganization and the forced reality forced businesses to set up Bezeq stores, which led to a cyber epidemic of insufficiently secure sites.

There are simple steps you can take to protect yourself

Tags

  • hackers

Nadav Avital

Sunday, 25 October 2020, 01:22

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

  • Dimitri Tsignok, the suspect in the murder of his partner Anastasia Klein, ...

  • Finance Minister Katz meets with heads of disabled organizations: expresses appreciation ...

  • The self-employed: We lost confidence in the government, did not obey the closure instructions ...

  • 100 years of the great water survey by Pinchas Rotenberg 3.9.20

  • Students fight to reduce tuition following ...

  • Yoaz Handel enters his position as Minister of Communications: "Sees values ​​...

  • Director General of the Ministry of Health: Opening of studies in the ultra-Orthodox society ...

  • Cinema projector

  • Beyoncé on Instagram

  • Winter shone: first rain of the season in Jerusalem 20.10.20

  • Steamery Fabric Razor

  • The Prime Minister, at the police headquarters in Beit Dagan.

Edited by Nir Chen

The corona plague has dramatically affected our lives in a multitude of ways, with the most significant manifestation of all being the social distance that has moved much of our daily activities home.

The forthcoming closure policy has forced an accelerated transition of street store trade to the chain, at an unexpected speed that has advanced processes that could have lasted for years in a few months.

Already during the first closure in March, thousands of stores and businesses worked diligently to set up e-commerce stores and a delivery system, in order to continue the business sequence, in order to maintain an economic pulse.



The challenge in such a rapid transition to the network, which includes significant amounts of information, is great.

The pressing economic situation and the pressure have caused shop owners and businesses to set up their online stores recklessly and at low cost, which has led to a cyber epidemic of insecure enough sites, and a focal point for hackers and criminal organizations operating in the internet space around the world.

Good to know (Promoted content)

Precedent step: The company that gives its policyholders a financial grant

By WE SURE INSURANCE COMPANY

To the full article

You really do not want your site to look like this

Nadav Avital

A study conducted by the research group at the cyber company Imperva, is one of many recently published, part of a series of studies that present the security and privacy implications of poor access settings of applications and databases.

Poor access settings, which may result, among other things, from accelerated construction processes, have been one of the main reasons in recent years for security breaches and data leaks.

Defects in settings will also come as a result of lack of knowledge or attention.

These reasons, along with the significant increase in the number of businesses that have been forced to provide online services quickly as a result of the closure policy, is a good reason for each of us to be concerned about the disclosure of the personal details it provides.



During the study, led by Vitaly Simonovich (director of the security research team) and Sarit Yerushalmi (security researcher), the research group set up several environments around the world that simulate databases with personal details that are not well defined, open to access, with weak passwords, or no passwords at all.

That is, baits.

Within a short time, between a few minutes and a few hours, all the surroundings were attacked.

The attacks included attempts to break the password, search for sensitive information, add users with administrative privileges, take over the server, install a backdoor that allows an attacker to access at any given time, install viruses and ransomware attacks in which the attackers threatened to disclose, delete or use the information. Other.

Some of the attacks were carried out over time and in several stages where at each stage the attackers changed their behavior.

In addition, we have seen that some attackers used standard database management tools to carry out the attacks rather than dedicated attack software.

These findings indicate the difficulty in locating the attacks in real time and the need for a security solution that will provide an appropriate response.



So what can be done?

Business owners and online stores need to understand that they must store and secure the information they store.

For starters the data should be allowed only to those who need it and check that there is no public access, use strong and unique passwords and constantly monitor the access to the data.

Beyond that, it is also recommended to use a security solution that detects dangerous commands and unusual access patterns and warns about it.

We hope the study will promote awareness of the problem and understanding of the possible consequences.



Nadav Avital is the head of the research group at the cyber company Imperva

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

Source: walla

All business articles on 2020-10-24

You may like

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.