Cyber Security and Spam: How to Protect Your Website from Attack

CS and S pic 12015 was a year of major cyber attacks. From Ashley Madison’s massive data breach to hackers stealing the personnel information of 21.5 million current and former federal workers, the past year has proven the importance of implementing and regularly updating effective security measures.  Hackers are constantly improving their methods of breaking through cyber security, so security must constantly improve to match it.

CS and S Header 1

CS and S pic 2At Body1, we’ve implemented a multi-tier security system that thwarts everything from viruses to full cyber attacks.  First, we deliver content through CloudFlare, a content caching system that makes web pages load faster and blocks abusive botsand crawlers. Second, we use SSL (Secure Sockets Layer) certificates to encrypt all sites that handle sensitive data. Third, we deploy a firewall to limit unapproved access to our web servers. Fourth, we utilize a load balancer with a built-in intrusion protection system to filter out malicious traffic. These methods allow us to counter cyber attacks before they reach our sites.

CS and S Header 2

CS and S pic 4 On the other end of the security spectrum, Body1 is dedicated to providing ways for users to contact our clients without allowing spam to sneak through. There are many reasons why website owners would want to provide contact information on their site, but an unprotected email address can result in hundreds of spam messages a day. Toprevent spam, we use a javascript form that hides the email address that it sends to, block robots with a swipe captcha, and run all outgoing mail through a spam filter from GFI so that any spam that makes it past the captcha isn’t sent further.

CS and S Header 3

CS and S pic 3Data loss can happen to even the best companies if proper measures aren’t taken. In 2011, Amazon Cloud crashed, permanently destroying many of their customers’ data. Hardware malfunctions, server crashes, system overloads, and malicious attacks can all result in lost data. This is why backing up content and code is critical. Body1 utilizes a redundant content back-up system from CrashPlan that stores duplicate content and code copies locally and distributes it in the cloud.

CS and S Header 4

CS and S pic 5Maximizing uptime is vital to any business that depends, even in part, on the web. The majority of users will never return to your site if it’s down the first time they visit, and even long-time visitors will give up on your site if it’s often down. The best way to minimize downtime is to use a system with multiple layers of redundancy, each layer monitored for latency (slowness) and inavailability. At Body1, we achieve this by utilizing networked hardware and web monitors. Each of our web servers are monitored from global locations in North America, Europe, and Asia by both Hyperspin and Monitor.Us. Any latency can be picked up within five minutes, and the server can be swiftly scheduled for maintenance or, if necessary, replacement.