Are you safe from the HeartBleed vulnerability within your organization? As many as 66% of the devices on the internet are and require some form of fix (see www.heartbleed.com).
Security is an ever changing landscape. What was secure last year may no longer be secure today. HeartBleed is a perfect example – until recently, it was thought secure, but a hackers have found a way to exploit something that is used We understand that protecting and securing sensitive data is an integral part of running your business and our solutions are built to simplify security and compliance so you can get back to focusing on your business.
Our automated external vulnerability scans scanners will look for:
- Cross-site scripting, SQL injection, remote file inclusion and many other application and network-based vulnerabilities that can be used to exploit your site
- Scan reports that meet the Approved Scanning Vendor (ASV) Program Guide requirements
- Vulnerabilities prioritized by severity
- Detailed instructions for your technical staff to correct identified problems
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The ‘S’ at the end of HTTPS stands for ‘Secure’. It means all communications between your browser and the website are encrypted. HTTPS is often used to protect highly confidential online transactions like online banking and online shopping order forms.
Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock icon in the address bar to visually indicate that a HTTPS connection is in effect.
Contact one of our account executives today to schedule your security scan.