📄️ What is Cyber Guardian website security?
Cyber Guardian scans your website for the most common vulnerabilities often exploited by cybercriminals to obtain personal information, payment information, or even to install malware (malicious software) on devices.
📄️ What are clickjacking attacks?
Clickjacking occurs when a user is tricked by a fake website impresonating a real one. The user thinks they are accessing a different website and can perform actions that compromise their security or that of your organisation (sharing personal information, payment information, etc.).
📄️ What are cross-site scripting (XSS) attacks?
During a cross-site scripting (XSS) attack, cybercriminals inject code into your website to perform actions such as redirecting users to a malicious website or stealing passwords.
📄️ What are man-in-the-middle attacks?
Insecure connections to a website can be exploited in public places such as cafes and airports. An attacker can intercept all passwords and use them to access web services.
📄️ What are Denial-of-Service (DDoS) attacks?
In a distributed denial-of-service (DDoS) attack, the attacker uses several controlled computers (bots) to send multiple requests to your website and render it unusable. Through a flood of requests, the attacked system becomes saturated enough to refuse to work.
📄️ What is SSL encryption?
SSL encryption is a technology that creates an encrypted connection between a website and the user's web browser. Websites with SSL encryption use a protocol called HTTPS to exchange information securely. This way, cybercriminals cannot see the information sent or received by the website user. This is especially important for websites that handle online payments and exchange other sensitive information, but all websites should implement this encrypted connection.
📄️ What is website spoofing?
Cybercriminals may register web domains that resemble your own organisation's name or website to trick users into believing it is your website. These fake websites can be used to obtain personal information, payment information, or even to install malware (malicious software) on devices.