Page 6 - AeM_May_2017
P. 6

RESEARCH, ANALYSIS & TRENDS
















































             Cyber-attacks can hit anyone, anytime –

             you can be next!



            As is well-known, online shops require a par-        ing updates immediately.
            ticularly large number of protection mecha-
            nisms to fight IT attacks, but smaller compa-        The so-called OWASP (Open Web Applica-
            nies should be well-prepared, too: Cyber crimi-      tion Security Projects) listed e.g.the ten larg-
            nals like to use security gaps in outdated ver-      est security vulnerabilities for web applications
            sions of the shop software to inject malicious       that shop owners should know well, as it gives
            program codes that spy out the customer's            them a good overview of the pitfalls that exist
            payment information during the ordering pro-         in the structure and maintenance of web appli-
            cess and send it to the perpetrators. The            cations. But probably the best way for online
            locked in code and the associated data flow is       traders to rely on a professional security solu-
            usually not visible to users, therefore it is very   tion, such as a Web Application Firewall com-
            important to have the newest security                bined with a Customer Identity and Access
            measures in place.                                   Management (IAM) solution. Since such a so-
                                                                 lution is connected upstream of individual web
            Protect yourself                                     applications, it protects them even if there are
                                                                 open security gaps.
            The most important and most straight forward
            measure for a secure online store is simply          Unfortunately, data security often goes by the
            keeping all software up to date and implement-       board for cost reasons, but such negligence


      6            May 2017 - (Cyber) Security & Data Protection
   1   2   3   4   5   6   7   8   9   10   11