checkmate against phishing in 9 steps – 2

checkmate against phishing in 9 steps – 2

The problem of the hacker attack is then moved from the internal defense to the Company defense of Mysite.eu. I did the tests on my sites written in WordPress but the process must be industrialized, as the same WordPress is a source of vulnerability and then Mysite.eu could in turn become a gateway to malware, access door increasingly treacherous depending on how many users consider it appropriate to follow these indications:
THEREFORE
A) Create a site Mysite.ok in pure HTML5 language, without using cms tools like WordPress or others. The site is quite simple and therefore could cost from 3,000 to 5,000 dollars.
B) Verify that the company that builds the site has the necessary sensitivity to computer security, both as password and user management and in the construction of the software.
C) Use our VULNER product to verify the correctness of
developer not to put known or potential vulnerabilities in the site Mysite.ok or another software that achieves these goals.
D) Verify that the company that builds the site Mysite.ok is certified as a manufacturer of Cybersecurity.
E) Choose a provider that has a proxy that has the characteristics to comply with point D
F) Do not allow others to make updates on Mysite.ok, except
the certified company referred to in point D
G) Have the company enter the PHP server side code that sets the proxy as described in points 4 and D.
H) Use our KEY-PSW-LOCK product to change it more securely
the passwords to Mysite.ok, all passwords must be encrypted.
I) Verify with appropriate network traffic analysis software the correct use of the Mysite.ok website, identifying possible fraudulent access.