Our Blog

My website got hacked, hijacked or held for ransom - how...why?
Ed Hanchett

My website got hacked, hijacked or held for ransom - how...why?

Software vulnerabilities. Hackers. Ransomware. Labels that people whisper about create an online battleground that we must deal with. So let’s talk about them openly and loudly.

If you have ever been the victim, whether it’s of an online hacker or an identity thief, you are likely left feeling vulnerable and violated. I know that’s how I felt and I’ve been the recipient (or target) of both. And I thought I had taken the precautions necessary to protect myself so I was also angry.

So how does it happen if you have all of the protections in place?

Well, the simplest answer is that software is fallible. There are mistakes and errors in software code that allow the application function, and yet be compromised. I get that brilliant minds with pedigreed educations and tremendous experience are creating the code and yet, they are human and as we know, humans make mistakes. Because humans are fallible, the software code they create is likewise fallible.

In today’s web-based world, there are a lot of software applications that are released to the world as “open source”. If you’re not familiar with that term, allow me to explain. A developer creates a software application by writing software code. It’s like writing a book but instead of being written in your native language, it’s written in a programming language. That code (known as the ‘source’ code) tells the computer what to do and how to do it. You’re probably familiar with the Microsoft suite of software applications that each perform a specific set of functions. In the case of Microsoft applications, you must purchase a license that allows you to use the application. You cannot change the application and must use it in its native form. Some people (and companies) create software applications that instead of selling them (like Microsoft), publish the application – and its code – to the world for free. That application becomes known as an “open source” application because 1) it’s free and 2) everyone has equal access to the ‘source code”. And by everyone, I mean the good guys and the bad guys.

Being open source and available to everyone, the good guys use the application for, well, good things. Content Management Systems (CMS) applications, for example, are an open source application that is commonly used for good. The popular CMS apps are DNN (DotNetNuke), WordPress, Drupal, and Joomla - and there are many others. These apps share a lot of similarities that extend beyond them just being open source. In fact, they are the backbone of the majority of websites today.

In fact, it so common, that companies like equaTEK build an entire business segment utilizing one of the popular CMS applications (DNN) as its foundation.

Just as we have access to the open source code, as mentioned, so do the bad guys. We use that access to augment the code to provide the functionality that a client desires in their website. The bad guys though want to discover vulnerabilities that is in the code and then exploit them for their personal gain. The havoc they reign through their illegal actions is immeasurable. 

So how do you combat this? You put as many security barriers in place that is reasonable and then you watch and monitor. The alternative is expensive and requires using applications that are not open source. This prevents someone that does not have access to the source code (the bad guys) from exploiting its vulnerabilities. Just as we do not live in a perfect world, there is not a perfect solution.

If you'd like to discuss this article in greater detail, feel free to contact us. We welcome the opportunity to discover the right solution for you!

Previous Article Today's Quote: Johann Wolfgang von Goethe
Next Article Today's Quote: Author Unknown
Print
14477

Will you be a Level Five Leader?

Will you be a Level Five Leader? Read more

The designation is earned if, and only if, the organization or department that you led thrives after your departure. 

Yikes! That almost hurts. Pull out your box of bandaids and click on Read More to discover if you will gain the designation of a Level Five Leader!

A wolf in sheep’s clothing

A wolf in sheep’s clothing Read more

What would you do when you learn that a key and long-term vendor can threaten your business by holding you hostage?

The "DIY" website dilemma

The "DIY" website dilemma Read more

How many advertisements have you seen that make it sound like creating a website is easy...that it only takes a few minutes....that anybody can do it? And best of all, you'll be rich in no time at all. If any of that were true, why is there such a huge number of professionals who make a career out of creating incredible websites?

Email: the perfect imperfection

Email: the perfect imperfection Read more

Unless you’ve completely removed yourself from today’s technology, I imagine you’ve sent and likely have received, as least one email today. But did you receive all of your emails that were sent to you? Did your recipient receive all of the emails you sent to them?

Is your business website wearing a mask?

Is your business website wearing a mask? Read more

Are you an effective communicator? Do you speak and write with purpose? Do people hear - and understand you?

RSS
245678910Last