Optimise and Secure Your Website

Domain Names

The Internet has provided an opportunity for businesses to convert their online target audience into customers. Learn quick tips on converting searchers to customers.

What is malware?

Maximise the impression your business makes by building a strong and reliable online presence.

An Internet presence when used strategically can help your business increase inquiries for your products and services. See how.

Now that you have built your website, an important phase begins - promoting your website. Learn tips on how you can get more visitors to your website.

Once you have your domain name registered and have selected a hosting provider, it is time to build an effective business website. Take these basics into mind when planning your website.

How to Bring in Repeat Visitors

Types of Malware
Distribution
Payload
Malvertising: Malicious ads displayed on websites leading to Exploit Kits
Malvertising
SEO Poisoning: Malicious attackers inject common search terms in an iframe script designed to send victims to other sites hosting malicious code. The search term and iframe redirect and get cached in search engines such as Google. Victims who click on the links are sent to sites hosting malicious code.
SEO Poisoning
Typosquatting: Also known as "URL hijacking," it is a form of cybersquatting which relies on typographical errors made by an internet user when typing a web address into a browser. If an incorrect website is entered, the user is led to a rogue website owned by a cybersquatter.
Typosquatting
Social Engineering: Make use of URL shorteners, or social network like-jacking to disguise malicious links
Social Engineering
Exploit Kits: Drive-by downloads that can be activated simply by visiting a website with your browser. This is the most dangerous form of malware. No user interaction, or click, is needed to infect a user’s computer.
Exploit Kits
Trojan: After installed on your system, this program will steal information to tunnel to outside parties (credentials, personally identifiable information (PII), espionage).
Trojan
Fake AV: A rouge antivirus program designed to mislead people by posing as a legitimate antivirus program, but in reality it is only a fake version of the original software which gains access to a system with the help of bogus online scanners, insecure websites and Trojans.
Fake AV
Dropper Downloader: Downloads additional malware to an infected user’s computer, without their knowledge or consent.
Dropper Downloader

Website as a Marketing Tool

Cyber criminals can also attempt to access your personal information by monitoring your computer’s activity. Your computer could be controlled to visit websites or partake in mass attacks without your knowledge. Malware can steal your identity or cause your computer to crash.

Keeping your website up is critical to your online reputation. Understand how your business can be impacted if the infrastructure supporting your site is not reliable and secure.