Adventures Of A Soon To Be Business Owner Entrepreneurs Blog

This blog is a documentation of my journey into the world of small business ownership.

Total indexed: 11 posts
Average post: Every 59 Days

Blog Directory  >  Business Blogs  >  Entrepreneurs Blogs  >  Adventures of a Soon to be Business Owner Entrepreneurs Blog

Correcting mobility issues in WordPress

In the last few months Google has started penalizing for website mobility issues which will affect your search engine rankings. If you have Webmaster Tools, you can view the errors by logging into your account. Depending on the type of website you have, the problems can range from being very easy to fix to being numerous and difficult. In this blog post, I will cover how to correct mobility issues with WordPress which fortunately is fairly easy.

Google Mobility Issues

The first thing you will want to do is make sure your WordPress version is updated along with your theme and plugins. As a side note you should be doing this anyway for security reasons. Many WordPress themes will be mobile friendly, but not all of them, so once you’ve updated your version, you’ll want to login to Webmaster Tools and check some specific pages.

Read the full post >>

What to do if your small business website is hacked

I offer a ton of tips and advice on how to protect your small business from a data security issue. But let’s face it, no matter how well we protect our data, the hackers are always going to be ahead of us. So there is always the potential of having a data security issue, and one of the most common problems small businesses face is website hacking.

If you are running a content management system like WordPress or if you have an e-commerce shopping cart, it is crucial that you keep it updated with the latest security updates, back it up regularly, and take steps to protect it such as utilizing a firewall, malware/virus detector, etc. Most hosting companies will offer these products for a small monthly fee, you can buy them yourself, and/or WordPress has many security plugin offerings for free.

Read the full post >>

WordPress SEO by Yoast has a security vulnerability

If you are using WordPress SEO by Yoast there is an existing vulnerability to Blind SQL Injection, and you should update the plugin immediately.  More details can be found here

Related posts:

  1. Vulnerability in the UpdraftPlus plugin for WordPress
  2. Data security – vulnerability scans
  3. WordPress Plugins – Backup and Security
Read the full post >>

Vulnerability in the UpdraftPlus plugin for WordPress

If you are using the UpdraftPlus plugin to backup your WordPress website, you should upgrade it immediately.  A vulnerability was discovered that could allow an attacker access to your site’s files among other things.

You can find more details about the vulnerability here.

Related posts:

  1. Additional WordPress Security & Backup Plugins
  2. Some additional WordPress Security Plugins for you to consider
  3. Data security – vulnerability scans
Read the full post >>

Some additional WordPress Security Plugins for you to consider

Because WordPress is such a popular blogging tool, it is also susceptible to a large amount of security issues via attacks, hacking, etc.  So from time-to-time, I like to publish a list of WordPress Security Plugins for your consideration, and here are the latest.  You can search for any of these plugins via the WordPress Plugin section of your WP Dashboard, and all the descriptions are from the WP plugin database.

Simple Security

Simple Security Plugin for WordPress is an Access Log to track Logins and Failed Login Attempts for the admin area of your WordPress Website

Read the full post >>

Updates on recent security issues – Heartbleed and IE Security Issue


In addition to affecting websites, many mobile apps were also affected by the Heartbleed bug.  You can view an updated list of affected mobile apps here or download a Heartbleed Android mobile app scanner here.  As always make sure your mobile apps are updated regularly and change the password on a routine schedule.

IE Security Issues

There are vulnerabilities in certain versions of Internet Explorer that could allow remote code execution.  Visit the Microsoft website to get the update, and please note this update will also work for Windows XP users .

Read the full post >>

What does the Heartbleed Bug mean to your business?

The Heartbleed Bug can exploit some websites running SSL encryption (Apache and Nginx), and it can expose private information such as passwords.  This means the bug could affect your website if you are running SSL, social media websites, financial institutions, email, and many more websites.  So here are some immediate steps you should take to protect your business.

  1. If your business has a website, intranet, and/or extranet running SSL, it could be vulnerable.  Check with your hosting company to see if they have patched their servers.  If you host your website, visit OpenSSL to find out how to install the patch.
  2. Your social media website passwords could be compromised.  Change your passwords and see here for a list of specific sites that should be addressed immediately and here for a larger list of websites.
  3. Limit your employees from accessing social media, e-commerce, financial institutions, and other websites with SSL in the short term.  It will take some time for every business to address the bug and install the patch.
  4. And when in doubt, change your password, and make sure it meets strong password requirements.
Read the full post >>

Data security – network port controls

One of the most common ways hackers will exploit and attack a business network is through open and unsecure network ports.  By using a default or “easy to guess” user/password combination, hackers can gain access through network services and software such as mail servers, email servers, DNS servers, VOIP servers, and other network servers.  Here are a few tips to help you close and monitor your network ports to prevent these type of attacks.

  1. Install a firewall(s) and a network port filtering tool and set rules to only allow business verified network traffic and to monitor  all network traffic.
  2. Routinely check and install security patch updates.
  3. Maintain and audit these applications on a regular basis to ensure all rule, patches, and services are up to date.
  4. Routinely audit all ports and protocols, perform automated port scans, and compare results and settings to your asset management system.
  5. Ensure systems are in place to routinely and quickly alert when unauthorized ports are installed and opened.
  6. It may be necessary to maintain critical servers in isolated environments with no internet access.
Read the full post >>

What does the Target hacking mean for small businesses?

It is now looking like 70 million Target customers had their personal information, including name, address, phone number, and email address, stolen during the holiday shopping hack.  Target has already experienced a loss of sales and earnings, stock price drop, and the cost of providing one year of fee credit monitoring to all the people who shopped in their stores over the time period.  In addition they will probably face a loss of customers as well as state and federal fines.  For Target this is going to hurt their business, but they will eventually recover.  But what if this happened to your small business?  Would you be able to recover?

Read the full post >>

Data security – web based and software application security

The majority of data security attacks and vulnerabilities can be found in software applications and more specifically web software applications.  Major hacker attacks of online systems are becoming more and more commonplace with hackers exploiting vulnerabilities through SQL DB injection attacks, buffer overflows, cross-site scripting, and many more areas.   So it is important for you to protect your business by testing application software for vulnerabilities, and here are some examples of how you can strengthen your business against these attacks.

Read the full post >>

Data security – vulnerability scans

I covered the need to perform routine vulnerability scans in my 5 Step Data Security Plan for Small Businesses, and in this blog post I would like to add a little more detail to how you should be performing vulnerability scans.  Not only are you using vulnerability scans to detect potential issues within your network, [...]

Data security – vulnerability scans is a post from: Adventures of a New Business Owner.

Related posts:
  1. MBSA – Another free tool for vulnerability scanning
  2. SMB security – network vulnerability scanning
  3. Small business data security – Audits
Read the full post >>