How Machine Learning Quantifies Trust & Improves Employee Experiences

How Machine Learning Quantifies Trust & Improves Employee Experiences

Machine Learning Quantifies Trust Bottom Line: By enabling enterprises to scale security with user behavior-based, contextual intelligence, Next-Gen Access strategies are delivering Zero Trust Security (ZTS) enterprise-wide, enabling the fastest companies to keep growing strong. Every digital business is facing a security paradox today created by
The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

Well the Zuckmeister has done his dance in front of Congress. Guess what? Nothing is going to happen, nothing ever does. Stop sweating it. History shows you’ll be fine. Zuck confirmed that most of our representatives don’t have a clue about how the internet or

Protecting Against Insider Threats

Continued from part 1 of our 5 part WordPress security series.

A recent Breach Level Index report by Gemalto, a global cyber security solutions provider, is titled “Poor Internal Security Practices Take A Toll” for a reason. The insider threat is the biggest source of stolen – or lost – records in the first half of 2017, according to the report. Accidental loss accounts for a whopping 86% of all stolen records, with over 1.6 billion records compromised in just six months.

Users prefer convenience over security because it’s in human nature to look for easy ways to get a job done. So, if you want to boost your WordPress security, there is one potential threat that you can’t afford to overlook – yourself and your users.

(Infographic Source: Breachlevelindex)

Contributors who have access to your WordPress back end can be a part of your defense, or your weakest link (without ever realizing it). Let’s see how you can safeguard your blog against internal threats.

#1. Good Password Hygiene

WordPress – and common sense – requires that you use strong passwords, but what is a strong password? A WordPress expert Alex Grant says a strong password is complex and easy-to-memorize at the same time.

Password management programs do a great job of generating and storing your passwords in an orderly manner. This option is feasible if you have multiple blogs since you want to avoid re-using one password across multiple accounts.

Even though automatically generated passwords are secure, they are also impossible to memorize. So, many bloggers just default to weak passwords that are easy to crack.

One simple way of creating strong passwords you can memorize is to use a passphrase based on logic known to you alone, for instance:

My_goal_is_2_weigh_50_kilo$

The longer the passphrase, the harder it is to crack, and the easier it is to memorize. Use this technique not only for passwords but also for answers to your security questions.

Tips:

  • Don’t use the names of your favorite sports teams and music bands, or anything that hackers can mine from your Facebook profile.
  • Don’t store your passwords in a Notepad or Word file in plain text. If you need to store them in an electronic format, use encryption programs or password managers.
  • Don’t re-cycle your passwords across multiple accounts.
  • Don’t share your passwords with anyone since you never know how laid-back other people may be about cybersecurity.

#2. Protecting Your Password From Unauthorized Reset

One particular vulnerability that revolves around passwords is you can reset them. If someone gains access to your email, they can reset your WordPress password. If someone can guess – or research – the answers to your security questions, they can reset your password.

So, your password is just a part of the equation, where security of your administrative email account and reasonable complexity of your security answers are equally important.

#3. Locking Out Multiple Sign-On Attempts

As of now, WordPress doesn’t offer the functionality to block multiple sign-on attempts. This creates a risk for someone persistent enough to just try different username/password combinations for hours on end. So, you want to limit sign-on attempts to a certain number you deem acceptable.

Tips:

  • The WP Limit Login plugin lets you set the number of login attempts, define the lockdown time during which the user won’t be able to log in, and enable captcha.
  • Sucuri is a comprehensive suite that also allows you to tweak multiple sign-on settings to your liking.

#4. Restricting User Permissions

For blogs with multiple contributors, it’s best if the contributors only have privileges they need to do their work. You need to create the lowest risk environment, where user permissions are restricted to only the necessary minimum.

Otherwise, one user can mess up intentionally or accidentally, and delete someone else’s post, or mishandle their login credentials and expose them.

If a contributor’s account with minimum permissions gets compromised, the malicious party can only mingle with a very limited amount of content on your blog. If malicious actors access the administrative account, you’re in for trouble.

Tip:

  • Don’t assign temporary permissions to users making some technical adjustments to your blog. Chances are you can forget to restrict that account later on when the job is completed.

#5. Enforce The Use Of Strong Passwords

If your contributors use weak passwords, your WordPress backend is vulnerable. Don’t just leave your users to their own devices – set up restrictions that would only allow them to use strong passwords.

The current version of WordPress enforces the use of strong passwords. But if you run an older version, you can add this functionality via the Force Strong Passwords plugin.

Tips:

  • Passwords must be long and contain at least one number, and at least one special character.
  • Don’t enforce overly restrictive password rules, as this will result in passwords that are hard to memorize. You’d be into frequent password reset requests.

#6. Logging Out Idle Users

One more security vulnerability that comes from users is they forget to log out. When they do, your blog is exposed to great risks. Anyone with access to your contributor’s computer can tamper with your dashboard. So, security best practices suggest that you log out idle users.

Tip:

  • The Idle User Logout plugin lets you choose which user roles get to be logged out automatically after they’ve been idle for a set time. That way, your contributors won’t be losing any data, but your blog would be safe against yet another security vulnerability.

That’s it for today! The next WordPress security roundup will focus on:

  • Internal monitoring systems – WordPress Security, Sucuri, and Wordfence.
  • Security of your web hosting account.

So, stay tuned for more security tips from the WordPress guru Alex Grant.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services.

Contact us for a list of our leading brand and thought leadership exposure programs.

TOP ARCHIVES

Infosec thought leaders

Why you should add a connection broker to your suite of DevOps tools

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the ...
What makes ‘Cloud’ a dependable solution for the independent field workforce?

What makes ‘Cloud’ a dependable solution for the independent field workforce?

5 Major Reasons to Switch from Paper to Digital! The web of wireless networks has connected the entire world. It’s ...
A Smart Data Approach to Assurance in a Hybrid Cloud Environment

A Smart Data Approach to Assurance in a Hybrid Cloud Environment

Smart Data Approach Microsoft and Amazon both reported significant growth in their cloud businesses recently. Revenue for Microsoft’s Azure increased ...
4 Examples When AI And Robotics Work Better Than Humans

4 Examples When AI And Robotics Work Better Than Humans

Robotics and AI Science fiction’s portrayal of robotics and AI tends to be pessimistic when it comes to machines developing ...
Infosec thought leaders

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it ...