Page 6 - AeM_May_2017
P. 6
RESEARCH, ANALYSIS & TRENDS
Cyber-attacks can hit anyone, anytime –
you can be next!
As is well-known, online shops require a par- ing updates immediately.
ticularly large number of protection mecha-
nisms to fight IT attacks, but smaller compa- The so-called OWASP (Open Web Applica-
nies should be well-prepared, too: Cyber crimi- tion Security Projects) listed e.g.the ten larg-
nals like to use security gaps in outdated ver- est security vulnerabilities for web applications
sions of the shop software to inject malicious that shop owners should know well, as it gives
program codes that spy out the customer's them a good overview of the pitfalls that exist
payment information during the ordering pro- in the structure and maintenance of web appli-
cess and send it to the perpetrators. The cations. But probably the best way for online
locked in code and the associated data flow is traders to rely on a professional security solu-
usually not visible to users, therefore it is very tion, such as a Web Application Firewall com-
important to have the newest security bined with a Customer Identity and Access
measures in place. Management (IAM) solution. Since such a so-
lution is connected upstream of individual web
Protect yourself applications, it protects them even if there are
open security gaps.
The most important and most straight forward
measure for a secure online store is simply Unfortunately, data security often goes by the
keeping all software up to date and implement- board for cost reasons, but such negligence
6 May 2017 - (Cyber) Security & Data Protection