CentOS 5 reaching EOL (end-of-life) on 31st March 2017, after that software developer will stop supporting it and deprecate its use.
The CentOS released in April 2007 received full updates till 2012 after that only maintenance and security updates were received.
With this, cPanel would also no longer support it. Continuing with non-supportive and un-maintained OS can lead to security vulnerabilities and won’t be fixed.
Category Archives: Cybersecurity
Cloudbric Security
Key Selling Points
- Award Winning Cloud-based web security service
- Partners with Hosting providers to strengthen and power their security solutions.
Services Offered
- Filter malicious website traffic with Penta Security Systems’ cloud-based WAF (Web Application Firewall) service patented Logic Analysis. WAF comprised of 26 preset rules to intelligently recognize thwart cyber threats.
- Smooth and easy web security, SSL
Executive
Achievements/Awards
SC Magazine Awards honored Cloudbric as the best SME security solution for providing small to mid-size businesses with a reliable website protection service.
Latest News
- (September 22, 2017) Announced partnership with eSecureData to Extend WAF Service to Web Hosting Providers. It would bring its WAF capabilities to Vancouver and surrounding cities.
eSecureData – Canadian IDC channel and leading web hosting and infrastructure company.
BlackShield Security Platform
- Enables subscribers to monitor, repair and restore website data.
- Provides continuous Malware and Hack detection scanning services. It monitors alterations to website code and file structure and notifies site webmaster of unauthorized access in real time.
- Cleaning Compromised site: It provides repair and restores functionality to mitigate interruptions or downtime that may result from an infection.
- It monitors and maintains the business’s online reputation so that it can avoid being blacklisted by search engines.
- It provides protection from multiple attack vectors like direct hacks to reputation compromises.
- Defends insecure code from being exploited
- Protect websites from Brute Force attacks, DDoS attacks, SQL injection, malicious web bots, and hackers.
Cybersecurity Policy
The first concern in development is security. According to the Global Development Survey 2017, released by Evans Data Corporation (EDC), only 31% of companies formalize cybersecurity policy. The 34 percent have an informal policy adopted by various departments, while roughly 25 percent have a piecemeal system defined within departments or none at all.
The data size of the survey was 1500 developers from different regions in different languages. The report reveals that APAC companies are most likely to have overall formal cybersecurity strategy. The businesses in North America and the EMEA region have informal policies, and businesses without policies are most common in EMEA.
The report shows 26%of developers globally developing apps to run on secure and trusted systems, but within the next six months, 19% expect to start doing so.
Internet threats and its solution
Threats
- Growing hackers exploitation with sophisticated tools that hunt for known vulnerabilities of any website.
- Network of infected computer and devices
- Malicious internets traffic attacks such as an HTTPS Flood and DNS Amplification DoS Attack
- According to the survey conducted by Clutch, a leading research and reviews platform for business services, over 50% of websites collect visitors’ email addresses, creating the possibility of privacy breaches. Inconsistent security measures increase the risk of visitor’s privacy and greatest security risk to consumers. Clutch’s 2017 Website Security Survey included 302 site managers who built or maintain a web site for personal, business or other use.
- SSL misconfiguration
- Cross-site scripting attacks
- Malicious domain registrations & Phishing: According to the report of Anti-Phishing Working Group (AWPG), 2016, malicious use of the domain name system reached an all-time high, accounted for half of all domain names used for phishing in 2016. The AWPG report reveals 255,065 unique phishing attacks globally during 2016.
- Phishing: Cybercriminals set up web pages that masquerade as reliable brands, such as banks and e-commerce sites (PayPal, Yahoo, Apple), where they lure victims and by trick get sensitive information such as usernames, passwords, and credit card details.
- Domain shadowing: When an unsuspected company’s DNS settings are manipulated to insert multiple phishing sites onto the firm’s servers.
Solution
- Automation of security products in response to changing environment
- Continuous monitoring and scanning to detect security holes or issues
- Deployment of Firewall to block malicious traffic
- Site owners keep their systems up to date
- Fast removal of malware, hack repair and blacklisting by Google, Norton, and McAfee
- Proper Server Ecosystem: To keep the business running smoothly, hosting provider offers Backup & Restore Solution. Even if worst happens, a perfect backup makes it possible. Even, if you are on cloud computing, it is recommended to have a robust backup solution.
- Businesses take active measures to protect their web hosting and email services.
- Pay attention to the destination URL, while entering credentials.
Organizations
- Malware and Mobile Anti-Abuse Working Group M3AAWG, an organization that aims to fight abuse of internet infrastructure
- eQualit.ie, a Canadian-based nonprofit offers Deflect Service to protect against DDoS
co-founder: Dmitri Vitaliev
Cloud-based Access provider – DuoSecurity
Services Offered
- Security: Protect users, data and application from breaches, credential theft, and account takeover. It ensures only legitimate users and suitable devices have access to sensitive data and applications in a rapidly changing world of cloud applications and mobile devices.
- Easy-to-use two-factor authentication solution: Easily deployable and strengthens access security by requiring two methods to verify identity: something the user knows, plus something the user has. A user gets basic access controls, advanced administrative management, and user provisioning, along with an overview of overall device security hygiene. It gives users a secure single sign-on experience, and quickly conduct phishing vulnerability assessments.
- Checks user devices for out-of-date software and missing security controls. It blocks risky devices from accessing data and apps at login, protecting client organizations against software vulnerabilities.
- Identifies corporate vs. personal devices with easy certificate deployment
- Supports blocking of untrusted endpoints and provides users with secure access to internal applications without using VPNs.
Headquarters: Ann Arbor, Michigan
Premium Customers: Dresser-Rand Group, Etsy, Facebook, K-Swiss, Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow
Net Neutrality
In 2003, Net neutrality principle described that ISPs (Internet Service Providers) should treat all of the data they are providing to customers equally, and would not use infrastructure to block out competitors by taking advantage of their position. It provides an equal chance to small companies to build a user-base and break into the market and increases innovation and competition.The consumers use the Internet for varying usages like viewing content like TV shows, films, and websites.
As a consumer you pay for Internet usage on mobile, so you shouldn’t be charged for data used for services like WhatsApp or Facebook Messenger. Nor, the Internet provider should prioritize the content and services, and delivered equally and justly.
Who safeguards Net Neutrality?
- Open Internet Order introduced during Barack Obama administration
- The principle is active and came effect in October 2015, in British law courtesy of the European Union’s Regulation on Open Internet Access. The UK broadband market is highly competitive and allows customers to choose and switch to the best provider as per needs.
- In UK regulators like Ofcom enforce net neutrality rules
US Federal Communications Commission’s (FCC) proposal to de-regulate would give big cable companies control over what we see and do online. In the protest, Amazon, Reddit, and Netflix altered the way services displayed. FCC chairman Ajit Pai wish to get rid of the Open Internet Order on competition grounds.
SSL Provider – GeoCerts
Key Selling Points
- A leading provider of TLS/SSL certificates and certificate management solutions.
Services Offered
- GeoTrust products
- Comodo’s TLS/SSL certificate and cWatch Web
Headquarters: Atlanta
Executive
President: Michael Fowler
Suppor: 24.7.365 with white-glove support experience
What for customers?
- Helping clients with right certificate solution
Website Security Solution Provider – GamaSec
Services Offered
- GamaSure PLUS: Data Breach Limited Warranty: cloud-based website vulnerability identification, remediation-as-service, web attack prevention and a $50,000 Data Breach Limited Warranty.
- GamaShield PLUS: website security service
Establishment: 2006
Headquarters: Israel with offices in New York City
Target Customers: Small and medium-sized businesses of United States, Canada, and Puerto Rico
What for Customers?
- A pioneered approach, as service, includes a combination of both security and financial assurance.
- The company offers affordability and quick action.
Website Security Solution Provider – Quttera
Services Offered
ThreatSign – Website Anti-Malware Platform
- The company offers it as security-as-a-service (SECaaS) and an on-premise website anti-malware solution
- Fully-managed environment: The service run in a distributed cloud environment and deployed on a private or hybrid enterprise cloud
- Internal Server-Side (FTP/ sFTP) malware monitoring. It quickly removes malware and blacklisting.
- External Monitoring (HTTP/ HTTPS) – Client Side malware scanning
- Scalable bulk scanning
- Uptime monitoring to alert upon down/uptime of website
- DNS/ IP monitoring to track DNS attacks
- Blacklisting removal: Enable organizations to secure their website portfolios. Hence, establish effective cyber risk management.
- Furthermore, provides improvements to existing website security features.
- Security analytics and metrics: Provides professional reports including email alerts and history
ThreatSign Benefits
- Efficient and cost-effective malware solutions for websites
ThreatSign Technology
- Uses a combination of threat intelligence gathered from millions of websites and URLs scanned daily all over the world
- It uses patented malware scanning algorithms and proprietary malware removal frameworks.
Executive
Target Customers
- enterprise-level website security to web hosting providers, managed service providers, IT solution providers, and the SMB market
- Website of any size and complexity: supports sites created on any Content Management System (CMS) and hosted on any web hosting platform
What for Customers?
- Provides hacking remediation support
Support: 24.7.365 by security experts and an incident response team
Free public Domain Name Service system
Safe DNS service ‘Quad9’ blocks malicious domains associated with botnets, phishing attacks, and other malicious Internet hosts. It would not return name resolutions for sites identified via 19 threat feeds—one of which is IBM’s X-Force that the service aggregates daily.
Internet Protocol address 9.9.9.9 would serve public DNS server like Google. The service launched by The Global Cyber Alliance (GCA), a non-profit law enforcement and research organizations partnered with IBM and Packet Clearing House.
About GCA (The Global Cyber Alliance )
Fight against cyber crime
Executive
Chief Technical Advisor: Adnan Baykal

You must be logged in to post a comment.