How does a marketing agency get involved with cyber security?
At Chatham Marketing, though our core business is marketing, we are committed to responding to the ever-changing needs of our clients. Recently, this has meant adding increased web and cyber security to the services that we offer our clients.
Businesses of all types, including small and medium-sized businesses, are facing increased cyber security threats, specifically from hackers and malware. Peoria businesses and non-profit organizations have experienced their websites being hacked, while others have been infected with malware. Also, a local web server was hacked and infiltrated in the last few months, with the hosted sites being defaced. In addition, hacks of major banks and retail companies’ servers have recently been in the news.
The attacks on web sites started becoming more prevalent in January, 2015, with over 100,000 WordPress-based sites being infected with malware. The challenge has continued for businesses all over with world, including some in Peoria.
These rapidly increasing threats, could mean a potential loss of sensitive proprietary data to local businesses, and, in some cases, increased liability. In the case of web security, your business’ reputation with the public could be at stake, meaning a loss of revenue.
Ways in which your web site may be compromised:
1. Malware, which may result in Blacklisting
Malware of many types can infest web sites, especially those with popular content management systems, such as WordPress, Joomla, or Drupal. If you site becomes infected, this can be detected by Google, which can result in your site being blacklisted. The loss of traffic to your site can be significant, but potential and current clients may then see the results of the malware infestation. This can result in lost business and hurt your online business reputation. Unfortunately, potential and current customers may not want to return to your site, even after the malware is removed.
When your site is blacklisted, viewers will see a warning – possibly within the Google search results themselves. First, the malware must be removed, then it can take 24 hours or more to get the site removed from the blacklist.
Google shares their blacklist data with Twitter, other search engines, and desktop antivirus programs. Some of these authorities run their own blacklists too. Many website security services leverage Google’s SafeBrowsing API to scan links for malware.
The solution is to keep your site free from malware in the first place.
2. Using your web site to distribute spam
Once your site is infiltrated, there are many ways that it can be used to distribute spam. The most common may be the malware that adds spam keywords to your posts, advertising everything from viagra to drugs to porn.
There is also malware that sends spam email from your domain. One of the worst types of infestation is spam that inserts itself into the Google search results for your site, so that the title and description that should be for your site, are spam. Again, the results of such infections are a possible loss of reputation and revenue for your business.
3. Malicious Redirects – redirecting your site’s visitors to another site
When your web site is hacked and infested with malware, your visitors may be redirected to another web site, without ever seeing your page. Malicious redirects can be set to respond to particular browser types, or only for mobile devices. The attacker institutes a malicious redirect to steal traffic from you, and to gain improvements in their search engine rankings.
Your site must be protected at all times from malware and hackers to prevent these problems.
Perhaps the most serious threat to your web site may be from malicious code that targets your visitors. Visitors to your site may get a virus on their computer, which could lead to using their computers to further spread malicious code, or their sensitive data being stolen. Identity theft is also a serious threat to visitors with this type of infection, or ransomware being installed on otheir computers. This could be the worst type of threat to your business, reputation, and sales.
Phishing is the process where hackers trick users into divulging their personal, sensitive information. This can come in the form of emails, which can be sent from your domain after your site is infected, or in social media posts, or posts on your web site. Phishing may look like a legitimate post or email message, but convinces users to click on a link to go to another site and give up their personal information. It may appear as an email or message from your company asking them to confirm their information for your “records.”
Phishing scams are on the rise, and are another reason why your web site must be protected at all times.
How Chatham Marketing helps our clients address cyber security threats:
Web site developers, advertising agencies, and marketing agencies must address these threats. Chatham Marketing now works with cyber security firms to address these increased cyber security challenges – both for our clients’ web sites on the server side, and our customers’ internal networks and computers, as well.
The system that we use scans your web site every three hours for any type of malware. We receive an alert if your site has been infected or blacklisted for any reason. If malicious code is found, web security technicians will manually remove it from your site, returning it to its previous condition.
- Web site security – anti-malware and antip hacking protection
- Risk management and reduction for identity theft issues for your management, employees, and customers
- Cyber security and network security
- Identity theft protection
- Unique employee benefits
Contact The Chatham Group for more information, and a review of your web security needs at no obligation.
Your cyber security needs must be addressed on both the web server side, and internally, for your networks and computers, to ensure that your business is completely protected.
We recommend these basic cyber security tips:
• Only open email/IM attachments from a trusted source and that are expected.
• If a person on your IM list is sending strange messages, files, or web site links, terminate your IM session.
• Scan all files with Internet security software before transferring them to your system.
• Only transfer files from a well known source.
• Keep security patches, antivirus and firewall software up to date.
Contact us to learn more about keeping your web site and internal network safe.