Skip to content

Category

Internet Security, Technology

Safe and Secure

By now we’ve seen that there’s a lot that goes into getting an e-commerce store online. And we’ve only just started scratching the surface! Before we close the book on this crash course, there’s one more thing we have left to address: the security of your payment processing system. Anyone who places an order on… Read more

Internet Security, Technology

Oil Changes for Your Web Site

Last week we painted a word picture comparing a Web site to a car. You can drive your site well enough if it’s built on a content management system, but most business owners (like car owners) lack the technical know-how to handle the required upkeep. Oil changes, tune-ups, tire rotations, all those little things that… Read more

Internet Security, Technology

You’re Not Too Small to Fight Back

Last week we noted that small business Web sites are more and more often coming under attack. This week, a look at the objectives these hackers have, and ways to fight back. There are three main strategies the hackers are pursuing: going after customer data, credit card details, and bank account information (especially on e-commerce… Read more

Internet Security, Technology

You’re Not Too Small to Be Targeted

Hello, small business owners! Do you think that, because you’re small, no one’s ever going to hack your site? Think again. The reality is that your small size makes you even more likely to be attacked. According to a recent report by Symantec (the company behind Norton Anti-Virus and other security products), targeted attacks rose… Read more

Internet Security, Technology

Calling for Backup

Last week we looked at the benefits, indeed the necessity, of making regular backups of your site. This week we cover some more detailed advice on the whens and hows involved. Where Should I Keep My Backups? There are three basic choices for where you might store your backed-up site; some are better than others:… Read more

Internet Security

Spam Be Gone!

Over the past three weeks we’ve seen a lot of examples of what a spam comment looks like. They come in all shapes and sizes, but they generally have one or more of these traits in common: Links to suspicious-looking sites Generic commentary that may or may not have anything to do with your post… Read more

Internet Security

Spam Hunting

The last two weeks we’ve dealt with the whys and wherefores of blog comment spam, and some common tactics those sneaky little devils use to try and get themselves published on your blog. For a refresher, visit the Spam Post Part 1 and Spam Post Part 2. This week, we have a continued look at… Read more

Internet Security

Spam on Your Blog!

By now you’re blogging regularly on your business site. Right? Of course right! Now that you are, you’ll be getting comments on your blog. Hopefully those comments form a useful discussion, coming from people who are genuinely interested in what you’re saying. Alas, not all comments are from legitimate readers of your wonderful content. Especially… Read more

MWD Web