Cyber security authorities, the Comodo Organisation have created history by surpassing Symantec to become the number 1 digital certificate authority in the world! “In the history of the Internet, this is the first time there has ever been a new number one in certificate authority market share, and we are extremely proud of this accomplishment,” said Melih Abdulhayoglu, CEO of Comodo. “It’s important to state that we’ve achieved this number one ranking through organic growth, not acquired growth, resulting from the strong customer and partner relationships globally. Consumers and businesses worldwide have spoken loudly and clearly that they choose and trust Comodo as their number one security provider.”
According to data by w3Techs.com, an independent IT market research firm, Comodo has taken 33.6% of the certificate authority market to claim the number 1 position. The report focuses on global web technology usage & certificate authorities of the top 10 million websites to calculate this share percentage. At ResellerBytes, we’ve recently shifted to COMODO, a more affordable entry point to SSL. Making it more accessible to everyone makes the Internet a more secure space. As part of our MegaSalePromo at ResellerBytes, we’re offering SSL certificates starting at $10.99 per year.
SSL certificates, the digital certificates that authenticate the identity of a website are managed & issued by Comodo.
Of the .COM websites using digital certificates, 34.7% of all .com websites use Comodo as compared to 29.9% who use Symantec.
Comodo Certificates are the quickest & most cost effective way or online transactions to take place.
At ResellerBytes, we’ve recently switched to Comodo in keeping with our promise to always offer the top of the line products. Throughout the month of June, we’re offering a 95% off on SSL certificates! Don’t miss out on the opportunity to get the industry’s best product at a great price for your customers!
If the security and privacy of your customers is important to you, then using SSL certificates should be on top of your priority list. Safeguarding your website helps you create trust in your business by offering an identity proof to your customers online. This kind of security gives your customers the confidence that no private information will be tapped online and that all the online transactions they make are secure with trustworthy Secure Server Certificates.
Why Comodo SSL Certificate?
Comodo SSL Certificate is one of the most trusted Secure Server Certificates that provides more security to your customers as compared to any leading Certificate Authority. This is because Comodo delivers top-notch desktop security to around 2 million new users every month, without any charges. Comodo is a distinguished SSL Certificate Authority offering a wide range of low-cost SSL certificates such as Enterprise SSL, Premium SSL, Instant SSL, Lite SSL, Pro SSL, Intranet SSL, Wild Card SSL and Free SSL.
Without the right tools, your Website isn’t trusted
Thousands of new viruses and Trojans keep popping up on the Web every single day. These viruses have the ability to harm millions of Websites and breach internet security and trust. If you’re in an internet business, it is critical for you to restore this trust. All thanks to Comodo, it offers you the right tools you need to regain your customer’s trust. The SSL Certificates authenticate individual identity, companies, websites as well as content.
Cyber-terrorists are usually impersonators. They survive on deception. Authentication is the heart of Internet Security and Trust. Authentication confirms that a certain individual, business, or website is genuine. Businesses can help build trust when visitors, software publishers, businesses, or websites are authenticated. This process makes sure that no critical information has been tampered with.
Trust can be rebuilt when Hackers or the viruses and Trojans they bring into existence are scorched. It can help boost the success of any online businesses and facilitate secure online interactions. And, Comodo makes this possible with ease.
Comodo SSL Certificate create trust online
Comodo has been providing authentication for thousands of websites across the globe. Most customers are aware that websites that are concerned about protecting online identity and transactions make use of recognized Secure Server Certificates. The award-winning desktop security, Comodo, is one of the most trusted services that can provide better security to your customers than any other source.
Comodo is one of the leaders in the SSL Certificate industry being the conceiver of the Certificate Authority / Browser Forum (CA/B Forum) – a group of Certificate Authorities and browser providers that established guidelines and implementation processes for the Extended Validation (EV). Comodo High Assurance Certificates make use of patented technology including Corner of Trust logo which provides customers with web identity assurance. When you analyze SSL Certificate issued by Comodo and compare it with others certificates, you will realize that Comodo offers the most cost-efficient secure server certificate with 99.9% browser recognition, thereby meeting all the basic requirements of Internet security.
Share your security tips & tricks with us in the comments below.
One of our previous posts covered the advantages of buying a Digital Certificate – through confidentiality, message integrity, non-repudiation, and authentication techniques (to name a few), Digital Certificates play a vital role in adding credibility and trust to your Brand. All this, of course, depends largely on the brand of Digital Certificate that is being used as well! We have that’s why tied up with the very best in the industry- Thawte. It is a Verisign Product and by far the most recognized Digital Certificate Brand out there. What’s more, the prices at which these are being offered to you are not only competitive but possibly the lowest out there. Many of your Customers though might not have made optimum use of these premium Digital Certificates (Thawte) that you offer them with – wonder why?
Buying the right Digital Certificate is not enough. The effectiveness of a Digital Certificate largely depends on the page that you install it on. So the next time you have a Customer who is not too satisfied with his Digital Certificate’s performance, it is probably because it’s not installed on the right page. Here are a few handy tips that you could give him:
It is a must to encrypt sensitive login credentials that are entered on the Login Page. A website that does not have a Digital Certificate installed on the Login Page is at risk of the client’s data being illegally accessed. Furthermore, with browsers getting smarter, for any page that asks for information and doesn’t have a Digital Certificate, the browser throws up a security message.
Even with the internet gaining so much popularity, there will always be a little hesitation when entering Credit Card information online. And during the purchase process, if the browser pops up a security warning, most users will stop right there and not end up buying the product! Statistics indicate that over 60 percent of shoppers do not complete the shopping process that they begin. Yes, there are various factors that contribute to this, however, a Digital Certificate on the payment page is the easiest and the most critical solution for reducing Shopping Cart Abandonment.
Any page that asks for email addresses:
Spam or unsolicited emails are doing around of the internet like never before. Customers are vary of giving their email addresses simply because they don’t want their email address being accessed by spammers. And not having a Digital Certificate on a page that asks for email addresses puts your Customer at a risk of their email address being accessed.
Another important point that your Customer can do is place the Digital Certificate seal throughout the Website, or at least on important pages like the Homepage. This assures the visitors that the site is authentic and business intentions are genuine.
They may seem quite simple but more often than usual, these important tips are ignored. And yes they do make a vast difference when implemented accurately.
SSL branding is synchronous with Trust. It’s been repeated time and again that customers will definitely not doubt your ‘sincerity to do business’ once they see you have certified and secured your website with a SSL certificate. Which directly translates to – using a trusted Certification Authority is essential for an effective Online Business.
As we have a recently posted about How to Secure Website Application & Server Level and more secure with EV SSL Certificates. Purchasing from proven, established vendors, specially in case of security products such as Digital Certificates, brings up the inevitable – How do I choose a SSL Certification Authority (CA) that my customers will Trust?
There are several things that buyers should look for when purchasing a certificate:
Reputation and Credibility of the CA
How long have they been in business?
Ubiquity of the Root
Is it embedded in all of the popular browsers?
Root is owned by the CA
And not chained like Third Party SSL certificates.
Lifecycle Management Tools
How easy is it to install, renew, reinstall and revoke if compromised.
Ease of Acquiring the certificate
For instance, Thawte provides their esteemed list of clients, that include Google, 3M Company, Honda Canada, Hershey, American Airlines, Credit Suisse Group, among others, with Root Certificates.
Removing all elements of doubt, Thawte has obtained the Trust Factor by successfully implementing the highest encryption and authentication standards recognized today.
As a brand with an online presence, security is of top priority. Hackers are always looking for loopholes and ways to compromise the security of your site. So, how can you secure your website? So, there are two levels that you can lock-down your website on and those are application and server.
Let’s discuss how you can secure your website on each level.
1. Security on Application level
Update script regularly: One of the first steps to secure your website is to update the script you’ve installed. Additionally, your focus should be on ensuring that any released update is installed to ensure you’ve plugged vulnerabilities. Since many of these tools are created on open software programs, they’re readily available to hackers however, this is not really a problem. Open source also has a huge advantage in that, hundreds and thousands of well-intentioned programmers have the opportunity to test for bugs and vulnerabilities and therefore could point out security issues that you make have overlooked. Ensuring you have the latest script updates minimizes the risk of intruders getting in. If you have third-party softwares on your website like a CMS or a forum, ensure you keep track of security patches through a mailing list or RSS feed detailing security issues. Tools like Composer, npm help manage software dependencies and vulnerabilities. It’s important to have your dependencies up to date. Try tools like Gemnasium to get notifications about vulnerabilities.
Use strong passwords and change passwords often: Yes, this seems basic but it’s important. If your password is easily guessable, you’re in trouble. According to the Telegraph, “123456” was the most commonly used password of 2016 followed by
Ensure your passwords are a combination of letters, both uppercase and lowercase, special characters and numerics. A truly secure password can prevent a security breach.
Delete installation folder: Once you’re done with the installation, ensure you delete the installation folder on your system to prevent hackers from any access or opportunity to get their hands on the folder and run the installer again. This is important because once in, the hacker can erase your database and take control of your website. In the case that you do not want to delete the folder, consider changing the name to avoid easy recognition. We’ve highlighted this in our earlier blog on Fault in the Default: 6 Simple Default Settings Tweaks to Secure Your WordPress site.
Use security plugins and website security tools: Plugins can boost the functionality of your script. There are tons of plugins that give your website and extra layer of security. Some website security tools that are useful are:
- Netsparker – for testing SQL injection and XSS
- OpenVAS – for testing known vulnerabilities
- SecurityHeaders.io – to quickly report security headers a domain has enabled
- Xenotix XSS – to confirm if your site’s inputs are vulnerable in web browsers
Change database table prefix: A blog or a website has a default database table prefix that every hacker is aware of. For example, WordPress has ‘wp’ as the table prefix which is very well known and therefore an easy entry point for intruders. A bunch of default settings like these on WordPress sites unknowingly expose your website to threats. Our earlier blog post calls each one out.
Limit error message information: The information you share on the error message can often be misused. Ensure you provider minimal information without mentions of the problem, server information like API keys, database passwords as access to this information can make hacking quite easy.
2. Security on Server level
Anti-Malware: Malware compromises passwords by stealing them when accounts are attacks. Malware can erase passwords used and stored by FTP and other programs. To protect your server against such attacks, ensure you install anti-malware and run scans on all computers which access the account. There are a number of scanners available depending on your operating system. SiteLock is a super simple and a fantastic security solution for scanning and malware removal. At ResellerBytes, we’re offering SiteLock starting at just $1.31
Server Hardening: Server hardening is the process of enhancing server security through a number of ways to make the server environment secure. Hardening servers make them more resistant to server issues. Some ways to harden servers include data encryption, disabling unwanted SUID and SGID binaries, using security extensions, minimizing unnecessary software, hardening sysctl.conf, installing Root Kit Hunter and Chrootkit hunter etc.
Port Blocking: Knowing which ports to block is important for security. Here’s a list of ports used by well-known Trojans highlighted by the SANS Intrusion Detection FAQ and some guidelines for shutting down these known vulnerabilities.
Firewall: A firewall prevents all network access to your server. The Plesk firewall is easy and to set it up, requires you to follow these steps: Navigate to server > Firewall > Modules > Firewall. If you have a static IP address, you can create rules so that the server will only allow access from your IP address at your home and/or office.
PHP Upgrades: Most shared hosting providers offer various versions of the open source programming language, PHP butan old version could expose your site to attacks. According to w3techs, PHP version 5.3 is used by 31.1% and 5.4 is used by 29%. Both versions have reached the end of its life and could pose a big security threat. The latest version of PHP currently is 5.6 which released in August 2014 and is valid till 31st December, 2018. Here’s more on how you can upgrade your website php version.
MySQL Upgrades: While there are many implementations of the SQL database language available on Linux and Unix-like systems, one of the most popular is MySQL. However, if configured incorrectly, this tool can be a security liability. Here’s more on how to secure MySQL.
SSH access: SSH keys are cryptographic keys used to authenticate to an SSH server as an alternative password-based login. This kind of authentication is completely encrypted. They’re a lot more secure than passwords and include significantly more combinations for a hacker to run through. Many SSH key combinations are considered almost impossible to crack mostly by computing hardware because it would require too much time to run through possible matches.
Use Encryption / SSL (HTTPS in links): Since January 2017, Google has begun flagging websites without digital certificates and HTTPS links as ‘Not Secure’. This mandate has been implemented to tighten security across networks. HTTPS guarantees users than the information passed from one network to another is completely encrypted and can be read by no one. This is especially necessary for sites that require credit card and personal information.
Apart from being important for your visitors, it’s critical to secure your site too. A login form will often set a cookie which is sent with every other request to your site that a logged in user makes and is used to authenticate those requests. An intruder would be able to imitate a user and take over your user’s login session and make you vulnerable to attacks. To safeguard against such attacks consider using HTTPS throughout your site.
Server side validation / form validation: It is best to do validation on both the browser and server side. The browser can catch failures like mandatory fields that are empty and numerics in text fields. While these can be bypassed, deeper validation on the server side and failure to do so could lead to malicious code being inserted in your database. To prevent this and secure your server, a validation is necessary.
A confirmation field is a good practice to allow the user to input additional confirmation for things like passwords. This ensures that the customer puts in the right information.
The key to securing your website is to regularly audit your site – both on the application as well as server end. A well managed website is a secure website. By putting it into practice to do regular checks, you can be certain you’re doing your very best to lockdown your site. CodeGuard is a great solution for automatic backups in the cloud with full website resortation and to monitor daily changes so you never have to lose data in case of a security compromise. We at ResellerBytes offer CodeGuard starting at just $1.17. Check it out!
Got more tips on how to tighten website security? We’d love to read about it in the comments section below.