When we hear news about data breaches, it’s almost always sensitive data exposure! Personal information, credit cards numbers, emails, passwords, health records, etc., are extremely valuable for attackers because it can be sold for lots of money in the black market/deep web. Attackers can use that information to commit frauds, open bank accounts, elaborate social engineering, among others. The impact can also be massive for companies who suffer data leaks, as fines are applied (GDPR), loss of trust by clients and reputation drops. This type of attack has multiple consequences for both people and companies, so be extremely careful!
According to Trustwave, in 2020 54% of the attacks came from internal networks and for Utilities, 83% of attacks from corporate/internal network. Many companies believe internal website, don’t require HTTPS considering no employee will cause harm. While companies should expect this to be true, we know it isn’t always the case. Employees always have credentials to access network, now imagine having an HR website that uses HTTP to transfer information. By evaluating the traffic as a man-in-the-middle one is able capture credentials in clear text (if not properly handled) and perform unimaginable things, as popular saying: the sky is the limit!
There are some measures that can help protect our clients from having their client’s sensitive data exposed, such as:
For more details you access this link from Mozilla. If you want to test your website HSTS Header, you can go to HSTSPreload and try it for free!
You can see below what our own site is sending to our customers:
Sensitive data exposure appears as the third type of vulnerability in the OWASP TOP 10. It deals with the way we store and manipulate sensitive data in transit and at rest. By implementing a simple header such as HSTS we can mitigate some risks while browsing a website. Hashing passwords with salt (just to enforce, I said WITH salt) can also help against password cracking, keep that in mind! Finally, don’t forget to implement SSL/TLS, aka HTTPS, to protect against eavesdroppers. Your personal information can be valuable for hackers, don’t forget that! The less they know about you, less they can do!
Article by David Santos Silva.
When we hear news about data breaches, it’s almost always sensitive data exposure! Personal information, credit cards numbers, emails, passwords, health records, etc., are extremely valuable for attackers because it can be sold for lots of money in the black market/deep web. Attackers can use that information to commit frauds, open bank accounts, elaborate social engineering, among others. The impact can also be massive for companies who suffer data leaks, as fines are applied (GDPR), loss of trust by clients and reputation drops. This type of attack has multiple consequences for both people and companies, so be extremely careful!
According to Trustwave, in 2020 54% of the attacks came from internal networks and for Utilities, 83% of attacks from corporate/internal network. Many companies believe internal website, don’t require HTTPS considering no employee will cause harm. While companies should expect this to be true, we know it isn’t always the case. Employees always have credentials to access network, now imagine having an HR website that uses HTTP to transfer information. By evaluating the traffic as a man-in-the-middle one is able capture credentials in clear text (if not properly handled) and perform unimaginable things, as popular saying: the sky is the limit!
There are some measures that can help protect our clients from having their client’s sensitive data exposed, such as:
For more details you access this link from Mozilla. If you want to test your website HSTS Header, you can go to HSTSPreload and try it for free!
You can see below what our own site is sending to our customers:
Sensitive data exposure appears as the third type of vulnerability in the OWASP TOP 10. It deals with the way we store and manipulate sensitive data in transit and at rest. By implementing a simple header such as HSTS we can mitigate some risks while browsing a website. Hashing passwords with salt (just to enforce, I said WITH salt) can also help against password cracking, keep that in mind! Finally, don’t forget to implement SSL/TLS, aka HTTPS, to protect against eavesdroppers. Your personal information can be valuable for hackers, don’t forget that! The less they know about you, less they can do!
Article by David Santos Silva.
When we hear news about data breaches, it’s almost always sensitive data exposure! Personal information, credit cards numbers, emails, passwords, health records, etc., are extremely valuable for attackers because it can be sold for lots of money in the black market/deep web. Attackers can use that information to commit frauds, open bank accounts, elaborate social engineering, among others. The impact can also be massive for companies who suffer data leaks, as fines are applied (GDPR), loss of trust by clients and reputation drops. This type of attack has multiple consequences for both people and companies, so be extremely careful!
According to Trustwave, in 2020 54% of the attacks came from internal networks and for Utilities, 83% of attacks from corporate/internal network. Many companies believe internal website, don’t require HTTPS considering no employee will cause harm. While companies should expect this to be true, we know it isn’t always the case. Employees always have credentials to access network, now imagine having an HR website that uses HTTP to transfer information. By evaluating the traffic as a man-in-the-middle one is able capture credentials in clear text (if not properly handled) and perform unimaginable things, as popular saying: the sky is the limit!
There are some measures that can help protect our clients from having their client’s sensitive data exposed, such as:
For more details you access this link from Mozilla. If you want to test your website HSTS Header, you can go to HSTSPreload and try it for free!
You can see below what our own site is sending to our customers:
Sensitive data exposure appears as the third type of vulnerability in the OWASP TOP 10. It deals with the way we store and manipulate sensitive data in transit and at rest. By implementing a simple header such as HSTS we can mitigate some risks while browsing a website. Hashing passwords with salt (just to enforce, I said WITH salt) can also help against password cracking, keep that in mind! Finally, don’t forget to implement SSL/TLS, aka HTTPS, to protect against eavesdroppers. Your personal information can be valuable for hackers, don’t forget that! The less they know about you, less they can do!
Article by David Santos Silva.