{"id":3759,"date":"2018-03-08T09:55:53","date_gmt":"2018-03-08T17:55:53","guid":{"rendered":"https:\/\/www.genesisdigital.co\/blog\/?p=3759"},"modified":"2019-05-09T11:31:43","modified_gmt":"2019-05-09T18:31:43","slug":"5-critical-security-issues-that-you-should-have-patched-by-now","status":"publish","type":"post","link":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/","title":{"rendered":"5 Critical Security Issues That You Should Have Patched By Now"},"content":{"rendered":"<p>There are critical business security issues that need to be handled sooner than later. Just last week, I discovered that we\u2019d gone to bed and forgotten to lock the rarely-used back door to our house. In fact, it wasn\u2019t just unlocked &#8211; it was slightly ajar.<\/p>\n<p>And it had been that way for at least three days.<\/p>\n<p>Fortunately, we weren\u2019t burglarized or killed in our sleep so the story had a happy ending. In fact, given that there were no consequences, I figured I\u2019d just leave the door open and unlocked indefinitely. I mean, why not? I\u2019m a busy guy \u2013 I have other important things to do.<\/p>\n<p>Don\u2019t get me wrong, I\u2019m not an idiot. I WILL close it eventually. But we\u2019ve got by with it open thus far, so there\u2019s no rush.<\/p>\n<p>(By now, you see this is a metaphor, right?)<\/p>\n<h3><b>Getting a Round Tuit<\/b><\/h3>\n<p>A friend of mine use to have a plate on his wall that was labelled, \u201c<i>A Round Tuit.<\/i>\u201d His wife used to complain that when she asked him to do a job around the house, he\u2019d say that he\u2019d do it when he \u201c<i>got around to it.<\/i>\u201d So, she figured if she bought him one, then stuff might start getting done.<\/p>\n<p>Is securing your online business (or reviewing the security you already have in place) one of those jobs that you figure you\u2019ll sort out <b><i>when you get around to it<\/i><\/b>?<\/p>\n<p>Maybe you read about SSL certificates and decided you\u2019ll get around to getting one eventually. Or you know that your Privacy Policy hasn\u2019t been updated or even reviewed in five years, but it\u2019s on your \u201cto-do\u201d list &#8211; somewhere.<\/p>\n<p>That\u2019s not a great position to be in because, potentially, your back door is not just unlocked but it\u2019s also slightly ajar. Just because no one has &#8211; so far &#8211; tunneled into your online business and set fire to everything doesn\u2019t mean you can keep putting these things off.<\/p>\n<p>It isn\u2019t just your profits and your customers\u2019 privacy that is at risk. Negligence leading to a serious breach could result in fines <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-england-leeds-33566633\">or even prison time<\/a>.<\/p>\n<p>So think of this article as your personal Round Tuit when it comes to security issues in your business. Here are five areas of your online business that you should review and lock down ASAP.<\/p>\n<p><i>Please know that none of this is legal advice &#8211; I\u2019m a writer not a lawyer. Most of the information in this article came from people in our business who understand this stuff way better than I do, so it\u2019s solid advice. But still\u2026 it\u2019s up to you to do your due diligence and research what your business needs to be compliant with the law.<\/i><\/p>\n<ol>\n<li>\n<h4><b> Purchase an SSL Certificate<\/b><\/h4>\n<\/li>\n<\/ol>\n<p>A Secure Sockets Layer (SSL) certificate is proof that your business has a tough layer of security protecting the connection between your website and your customers\u2019 computers.<\/p>\n<p>If you need to know more about the specifics of the technology there are some good <a href=\"https:\/\/www.youtube.com\/watch?v=SJJmoDZ3il8\">explanatory videos on YouTube<\/a> but all you really need to know is that it\u2019s inexpensive to purchase and it\u2019s ESSENTIAL if you collect any kind of data from your visitors.<\/p>\n<p>Whether it\u2019s names, email address, physical addresses, credit card numbers, bank details&#8230; it doesn\u2019t matter. If that bit of data identifies your visitors in some way, it should be encrypted and SSL is the simplest, fastest means of accomplishing that.<\/p>\n<p><a href=\"http:\/\/www.genesisdigital.co\/?utm_source=genndi&amp;utm_medium=blog&amp;utm_term=security&amp;utm_content=5-issues&amp;utm_campaign=kartra\">Genesis Digital<\/a> (Genndi) has a company-level SSL certificate that verifies and protects all of our websites. To obtain certification at that level is not cheap but, if you\u2019re a small business with a single website, you can purchase an SSL certificate for just a few dollars a month.<\/p>\n<p>And here\u2019s the thing about investing in security for your business\u2026<\/p>\n<p>When your customers can SEE that you take online security seriously \u2013 both yours AND theirs \u2013 this feeds into their positive perception of your business and builds trust.<\/p>\n<p>Money spent in securing your business doesn\u2019t just pay for itself. In the long run, it increases your profits.<\/p>\n<p><b>ACTION: Google \u201cSSL Certificate\u201d and purchase from a reputable provider (which may be your current website hosting company).<\/b><\/p>\n<ol start=\"2\">\n<li>\n<h4><b> Create (or Review) Your Privacy Policy<\/b><\/h4>\n<\/li>\n<\/ol>\n<p>There are legal requirements for your company\u2019s Privacy Policy and I\u2019m not even going to pretend that this stuff isn\u2019t complicated. But the good news is that this stuff scales.<\/p>\n<p>If you\u2019re a large company, you should seek legal advice. If you\u2019re a small business or a solopreneur, purchasing an inexpensive Privacy Policy template and customizing it for your business may suffice.<\/p>\n<p>Before you get to the stage of thinking about statutory compliance, it\u2019s good to come up with an ACTUAL Privacy Policy for your business. For example, Genndi\u2019s policy is this:<\/p>\n<p><i>Find out what protects the most people and implement it.<\/i><\/p>\n<p>It\u2019s a simple concept but it encompasses our determination to stay on top of security, and our decision to choose the best security options, regardless of cost or complexity.<\/p>\n<p>Yes, this is an ethical decision but it\u2019s also a business one. We hold firmly to the belief that what is in the best interest of our customers is also in our best interest. Tight security costs more but the trust it earns us increases our sales and our bottom line.<\/p>\n<p>This means security for Genndi is\u2026<\/p>\n<ul>\n<li>Doing our research.<\/li>\n<li>Watching for changes in policies and adapting as required.<\/li>\n<li>Considering the legal requirements in ALL geographic areas where are customers reside.<\/li>\n<li>Writing <a href=\"https:\/\/www.genesisdigital.co\/blog\/privacy-policy\/?utm_source=genndi&amp;utm_medium=blog&amp;utm_term=security&amp;utm_content=5-issues&amp;utm_campaign=kartra\">a formal Privacy Policy<\/a> document that reflects the above.<\/li>\n<\/ul>\n<p>This also led us to decisions such as using <a href=\"https:\/\/www.cloudflare.com\/\">Cloudflare<\/a>, becoming EU (European Union) privacy shield compliant and using reputable third-party payment processors so that we don\u2019t store customer credit card information.<\/p>\n<p>If you\u2019re a small business, start by googling \u201cPrivacy Policy generator.\u201d A basic template is inexpensive and easy to customize. If you\u2019re a large business (or once you start to grow in that direction), seek professional advice and be willing to invest in systems that protect your customers.<\/p>\n<p><b>ACTION: Create a Privacy Policy document and add it to your website (or review your existing document).<\/b><\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-3762\" src=\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach.jpg\" alt=\"Prepare For Security Breach\" width=\"1688\" height=\"1125\" srcset=\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach.jpg 1688w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-600x400.jpg 600w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-1024x682.jpg 1024w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-300x200.jpg 300w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-696x464.jpg 696w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-1068x712.jpg 1068w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/prepare-for-security-breach-630x420.jpg 630w\" sizes=\"(max-width: 1688px) 100vw, 1688px\" \/><\/p>\n<ol start=\"3\">\n<li>\n<h4><b> Prepare for a Breach<\/b><\/h4>\n<\/li>\n<\/ol>\n<p>Here\u2019s the bad news\u2026<\/p>\n<p>When it comes to a breach of your servers, it\u2019s not so much \u201cif\u201d but \u201cwhen.\u201d<\/p>\n<p>The good news is that breaches come in a variety of forms and don\u2019t necessarily have to involve ne\u2019er-do-wells breaking into your server and stealing stuff. A Distributed Denial of Service (DDoS) attack, for instance, is usually performed with the goal of bringing your site down rather than pilfering your digital data. It\u2019s still a headache but not as big a problem as losing sensitive customer data.<\/p>\n<p>Genndi, fortunately, has never experienced any kind of customer data breach but we\u2019re well aware that, as our company grows and becomes more visible, it is logical to assume that we\u2019ll increasingly become a target.<\/p>\n<p>The trick is to prepare in advance so that, if the worst happens, you have a clear plan of what to do and how to respond. If you wait until a breach takes place, you\u2019ll be too stressed to think clearly so now\u2019s the time to determine your action plan.<\/p>\n<p>Consider doing some or all of the following:<\/p>\n<ul>\n<li>Ensure your servers are backed up frequently, and test a recent back-up to ensure your system is working correctly.<\/li>\n<li>Speak to your server hosts about the security they employ and consider moving to a dedicated server.<\/li>\n<li>Make sure you always update your software as soon as an update is released in case it contains a patch for a security flaw.<\/li>\n<li>Create an action plan for evaluating your assets if a breach occurs so that you can properly assess what has and hasn\u2019t been compromised.<\/li>\n<li>Decide, in advance, what your PR (public relations) response is going to be.<\/li>\n<\/ul>\n<p>The last item in this list is the one that tends to be ignored in favor of a \u201clet\u2019s wait and see\u201d attitude. This is a mistake because it creates the temptation to try and gloss over the breach and hope that no one notices.<\/p>\n<p>If you publicly announce that you\u2019ve experienced a breach, you\u2019re going to take a hit \u2013 that can\u2019t be helped \u2013 but it\u2019s much, much worse if you\u2019re breached AND you\u2019re accused of trying to cover it up.<\/p>\n<p>Data breaches are forgotten surprisingly quickly (remember <a href=\"https:\/\/www.reuters.com\/article\/us-ebay-password\/ebay-asks-145-million-users-to-change-passwords-after-cyber-attack-idUSBREA4K0B420140521\">eBay in 2014<\/a> or <a href=\"https:\/\/www.theguardian.com\/technology\/2011\/apr\/26\/playstation-network-hackers-data\">Sony PlayStation in 2011<\/a> or <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mailchimp-found-leaking-email\/\">MailChimp in 2018<\/a>?) but they tend to linger in the news when details emerge of <a href=\"https:\/\/www.wired.com\/story\/equifax-breach-response\/\">poor responses<\/a> or attempted cover-ups.<\/p>\n<p>It can be a hard nugget to swallow but honesty is ALWAYS the best policy. Rest assured that if Genndi ever experiences an \u201cevent\u201d you\u2019ll hear about it from us, not from CNN.<\/p>\n<p><b>ACTION: Review your server security and backup system, and proactively plan your response to a breach. <\/b><\/p>\n<ol start=\"4\">\n<li>\n<h4><b> Protect Yourself from Ransomware<\/b><\/h4>\n<\/li>\n<\/ol>\n<p>Ransomware is a type of malware that encrypts your hard drive data and then attempts to extort money from you in exchange for releasing your content. This deeply unpleasant scenario is terrible enough when it hits an individual machine but, when it hits a network of computers, <a href=\"http:\/\/www.telegraph.co.uk\/news\/2017\/05\/13\/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive\/\">the impact can throttle your business<\/a>.<\/p>\n<p>If you\u2019re unfortunate enough to have your computer affected, take the following steps:<\/p>\n<ul>\n<li>If you\u2019re on a network, disconnect immediately (either pull the plug or turn your Wi-Fi off).<\/li>\n<li>Take photos of your screen.<\/li>\n<li>Check that it\u2019s a real infection and not just a pop-up pretending to be ransomware.<\/li>\n<li>Use an uninfected device to search for workarounds or fixes (even some of the nastier encryption-based varieties have patches for safely removing the malware and restoring your data).<\/li>\n<li>Your insurance may cover you for any damages so file a police report (this is where your photos come in handy).<\/li>\n<\/ul>\n<p>Paying the crooks who infected you <a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/09\/fbi-ransomware-extortionists\/\">should be an absolute last resort<\/a> and, even then, you\u2019re usually better off cutting your losses. Giving money to con men rarely works out well and, in the best-case scenario, helps to perpetuate the problem.<\/p>\n<p>Of course, prevention is always better than the cure. You can reduce the risk of contracting ransomware and mitigate the damage caused if you do experience an infection with the following precautions.<\/p>\n<p><b><i>Don\u2019t open email attachments or click links in emails<\/i><\/b> unless you\u2019re 100% sure it\u2019s from a trusted source. Even if you recognize the name and address in the \u201cfrom\u201d field, beware if the content sounds odd. It\u2019s not impossible for email headers to be spoofed so that it looks like the email is from someone you know.<\/p>\n<p><b><i>Stay off movie, TV and software download sites.<\/i><\/b> If you REALLY want to watch the new season of <i>Stranger Things<\/i>, fork out a few bucks for a Netflix subscription instead.<\/p>\n<p><b><i>Install antivirus software.<\/i><\/b> Yes, they can slow down your system and get in the way, but it\u2019s better than the alternative.<\/p>\n<p><b><i>Have a back-up system for all your local content.<\/i><\/b> If you contract ransomware that can\u2019t be nuked, you\u2019ll always have the option of formatting your computer and restoring everything from a back-up. If you hate the idea of buying back-up drives, try one of the online services that runs in the background and continually backs up to the cloud.<\/p>\n<p><b>ACTION: Install a back-up system and take caution with websites you visit and the emails you open.<\/b><\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-3763\" src=\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering.jpg\" alt=\"Be Aware Of Social Engineering\" width=\"1687\" height=\"1126\" srcset=\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering.jpg 1687w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-600x400.jpg 600w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-1024x683.jpg 1024w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-300x200.jpg 300w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-696x465.jpg 696w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-1068x713.jpg 1068w, https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/be-aware-of-social-engineering-629x420.jpg 629w\" sizes=\"(max-width: 1687px) 100vw, 1687px\" \/><\/p>\n<ol start=\"5\">\n<li><b> Be Aware of Social Engineering<\/b><\/li>\n<\/ol>\n<p>As digital security gets better, criminal hackers are increasingly looking to manipulate flaws in human systems. Why go to the trouble of trying to hack a secure system when you can ring a call-center and trick them into giving up personal information.<\/p>\n<p>This is more common than you might think. When you call your doctor\u2019s office to make an appointment, the receptionist asks for your name and, once you say it, they usually respond with, \u201c<i>Is your address 15 Juniper Lane?<\/i>\u201d. This is just one example of how easy it makes it for stalkers to get your home address.<\/p>\n<p>Even well-drilled call-center operators can slip up and unintentionally give out sensitive information when the right buttons are pushed, <a href=\"https:\/\/www.youtube.com\/watch?v=F78UdORll-Q\">such as a baby crying in the background<\/a>.<\/p>\n<p>Not to freak you out but the biggest security weakness in your business might be internal &#8211; not from unethical employees but just from <a href=\"https:\/\/www.usatoday.com\/story\/tech\/news\/2016\/08\/15\/hacker-social-engineering-defcon-black-hat\/88621412\/\">nice people being na\u00efve<\/a>.<\/p>\n<p>Your first point of action should be to limit the flow of internal information. The fewer the number of people who have access to company money or customer information, the fewer vulnerabilities available to criminals.<\/p>\n<p>At Genndi, very few people have access to critical systems, and gatekeepers are all high-level employees. For added security, we also ensure that no individual system is entirely managed by one person. Generally, we aim to have two people with access to sensitive data who can review each other\u2019s actions.<\/p>\n<p>The appropriate security system for your business will depend on the structure of your business. If you\u2019re a solopreneur, you might be the only gatekeeper in your business. But even a small business with only a handful of employees should still periodically review who has access to what.<\/p>\n<p>After that, it\u2019s chiefly about training your employees to follow security protocols, use complex passwords that are changed regularly and have the courage to refuse to give out information if the recipient hasn\u2019t completed security checks (no matter how angry or upset they get).<\/p>\n<p><b>ACTION: Review who in your business has access to sensitive information, and periodically refresh your employees on security protocols.<\/b><\/p>\n<h3><b>Simpler is Safer<\/b><\/h3>\n<p>There\u2019s a fair chance that you\u2019re thinking, \u201cThis is great advice, I should bookmark this article and review it again soon.\u201d<\/p>\n<p>Please don\u2019t do that.<\/p>\n<p>Instead, open your calendar and clear at least one (preferably two) days to take action on everything in this article. If you\u2019re concerned about the cost, the time required to put security in place or the complexity of following through on some of these recommendations, here is a final tip that will simplify your requirements\u2026<\/p>\n<h3><b><i>Use reputable third-party agencies to handle sensitive data.<\/i><\/b><\/h3>\n<p>Here\u2019s an example of how that works\u2026<\/p>\n<p>If you sell a product on your website and you take credit card payments, there are generally two approaches:<\/p>\n<ul>\n<li>The customer enters their credit card details into a form on your site. You then send that information to your payment processor.<\/li>\n<\/ul>\n<p>Or\u2026<\/p>\n<ul>\n<li>You send your customer to your payment processor (like Paypal) and that company takes the credit card information directly.<\/li>\n<\/ul>\n<p>From the customer\u2019s point of view, these two methods are virtually the same. But from your perspective, there is a HUGE difference. The first approach means you must take full responsibility for encrypting and securing your customers\u2019 credit card information whereas with the second, you\u2019re allowing your payment processor to take full ownership of the security.<\/p>\n<p>Removing your business from the credit card-collecting part of the procedure is not abdicating your responsibility. Instead, it\u2019s an acknowledgment that your payment processor SPECIALIZES in securely collecting that information.<\/p>\n<p>By taking yourself out of the process, you\u2019re providing crooks with fewer opportunities to intercept the transaction.<\/p>\n<p>This concept is equally true of things like autoresponders and web hosting. Handle it in-house and you have a LOT of security and privacy issues to contend with but, if you instead assign the job to a reputable agency who specializes in looking after this data, you provide a safer experience for your customers and save yourself a lot of unnecessary stress.<\/p>\n<p>This is actually one of the philosophies behind our <a href=\"http:\/\/www.kartra.com?utm_source=genndi&amp;utm_medium=blog&amp;utm_term=security&amp;utm_content=5-issues&amp;utm_campaign=kartra\">Kartra<\/a> software. When our customers use Kartra to securely handle multiple elements of their business (autoresponders, webpage hosting, helpdesk, membership portal, shopping cart, affiliate management, etc.), they also relieve themselves of the stress of having to lock the down security for all these different elements.<\/p>\n<p>And because all these elements of our customers\u2019 business are secured within one system, it also limits the number of entrances for hackers to attack.<\/p>\n<p style=\"text-align: center;\">***<\/p>\n<p>It probably goes without saying, but I\u2019m going to say it anyway\u2026<\/p>\n<p>This isn\u2019t an exhaustive list of security issues that your business needs to consider. But these represent the best places to start.<\/p>\n<p>The big key is to get started. Forget soon, later, next week and \u2018round-tuits\u2019 &#8211; book some time in your schedule now.<\/p>\n<p>This is not just about avoiding pain or even building trust with your customers &#8211; it\u2019s about your bottom line. Take care of your customers\u2019 security and they\u2019ll feel confident to purchase your products and services with trust.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are critical business security issues that need to be handled sooner than later. Just last week, I discovered that we\u2019d gone to bed and forgotten to lock the rarely-used back door to our house. In fact, it wasn\u2019t just unlocked &#8211; it was slightly ajar. And it had been that way for at least [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3760,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":""},"categories":[17,9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi<\/title>\n<meta name=\"description\" content=\"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can protect your business and your customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi\" \/>\n<meta property=\"og:description\" content=\"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can take action to proactively protect your business and your customers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Genndi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Genndi\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-08T17:55:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-09T18:31:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/5-critical-business-security-issues-to-patch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Genesis Digital\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webinarjam\" \/>\n<meta name=\"twitter:site\" content=\"@webinarjam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Genesis Digital\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\"},\"author\":{\"name\":\"Genesis Digital\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/3e01f9b03913fad677b08c937a3c8b61\"},\"headline\":\"5 Critical Security Issues That You Should Have Patched By Now\",\"datePublished\":\"2018-03-08T17:55:53+00:00\",\"dateModified\":\"2019-05-09T18:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\"},\"wordCount\":2824,\"publisher\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#organization\"},\"articleSection\":[\"E-Commerce\",\"Kartra\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\",\"url\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\",\"name\":\"5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi\",\"isPartOf\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#website\"},\"datePublished\":\"2018-03-08T17:55:53+00:00\",\"dateModified\":\"2019-05-09T18:31:43+00:00\",\"description\":\"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can protect your business and your customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.genesisdigital.co\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Critical Security Issues That You Should Have Patched By Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#website\",\"url\":\"https:\/\/www.genesisdigital.co\/blog\/\",\"name\":\"Genndi\",\"description\":\"Smarter Business. Better Lives.\",\"publisher\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.genesisdigital.co\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#organization\",\"name\":\"Genesis Digital\",\"url\":\"https:\/\/www.genesisdigital.co\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2016\/10\/Genndi-logo-4.png\",\"contentUrl\":\"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2016\/10\/Genndi-logo-4.png\",\"width\":1000,\"height\":350,\"caption\":\"Genesis Digital\"},\"image\":{\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Genndi\/\",\"https:\/\/twitter.com\/webinarjam\",\"https:\/\/www.linkedin.com\/company\/genesis-digital-llc\",\"https:\/\/www.youtube.com\/channel\/UCyduAT1s7lS64iq82RKMO8A\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/3e01f9b03913fad677b08c937a3c8b61\",\"name\":\"Genesis Digital\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1e2b3f9d91d0aeaab1541b2164d6f378?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1e2b3f9d91d0aeaab1541b2164d6f378?s=96&d=mm&r=pg\",\"caption\":\"Genesis Digital\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi","description":"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can protect your business and your customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/","og_locale":"en_US","og_type":"article","og_title":"5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi","og_description":"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can take action to proactively protect your business and your customers","og_url":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/","og_site_name":"Genndi","article_publisher":"https:\/\/www.facebook.com\/Genndi\/","article_published_time":"2018-03-08T17:55:53+00:00","article_modified_time":"2019-05-09T18:31:43+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/5-critical-business-security-issues-to-patch.png","type":"image\/png"}],"author":"Genesis Digital","twitter_card":"summary_large_image","twitter_creator":"@webinarjam","twitter_site":"@webinarjam","twitter_misc":{"Written by":"Genesis Digital","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#article","isPartOf":{"@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/"},"author":{"name":"Genesis Digital","@id":"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/3e01f9b03913fad677b08c937a3c8b61"},"headline":"5 Critical Security Issues That You Should Have Patched By Now","datePublished":"2018-03-08T17:55:53+00:00","dateModified":"2019-05-09T18:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/"},"wordCount":2824,"publisher":{"@id":"https:\/\/www.genesisdigital.co\/blog\/#organization"},"articleSection":["E-Commerce","Kartra"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/","url":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/","name":"5 Critical Security Issues That You Should Have Patched By Now &mdash; Genndi","isPartOf":{"@id":"https:\/\/www.genesisdigital.co\/blog\/#website"},"datePublished":"2018-03-08T17:55:53+00:00","dateModified":"2019-05-09T18:31:43+00:00","description":"There are 5 critical business security issues that need to be handled sooner than later. This article spells them out so you can protect your business and your customers.","breadcrumb":{"@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.genesisdigital.co\/blog\/learn\/e-commerce\/5-critical-security-issues-that-you-should-have-patched-by-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.genesisdigital.co\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Critical Security Issues That You Should Have Patched By Now"}]},{"@type":"WebSite","@id":"https:\/\/www.genesisdigital.co\/blog\/#website","url":"https:\/\/www.genesisdigital.co\/blog\/","name":"Genndi","description":"Smarter Business. Better Lives.","publisher":{"@id":"https:\/\/www.genesisdigital.co\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genesisdigital.co\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genesisdigital.co\/blog\/#organization","name":"Genesis Digital","url":"https:\/\/www.genesisdigital.co\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2016\/10\/Genndi-logo-4.png","contentUrl":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2016\/10\/Genndi-logo-4.png","width":1000,"height":350,"caption":"Genesis Digital"},"image":{"@id":"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Genndi\/","https:\/\/twitter.com\/webinarjam","https:\/\/www.linkedin.com\/company\/genesis-digital-llc","https:\/\/www.youtube.com\/channel\/UCyduAT1s7lS64iq82RKMO8A"]},{"@type":"Person","@id":"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/3e01f9b03913fad677b08c937a3c8b61","name":"Genesis Digital","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genesisdigital.co\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1e2b3f9d91d0aeaab1541b2164d6f378?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1e2b3f9d91d0aeaab1541b2164d6f378?s=96&d=mm&r=pg","caption":"Genesis Digital"}}]}},"featured_image_src":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/5-critical-business-security-issues-to-patch-600x400.png","featured_image_src_square":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/5-critical-business-security-issues-to-patch-600x600.png","author_info":{"display_name":"Genesis Digital","author_link":"https:\/\/www.genesisdigital.co\/blog\/author\/genndi\/"},"jetpack_featured_media_url":"https:\/\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2018\/03\/5-critical-business-security-issues-to-patch.png","jetpack-related-posts":[{"id":3134,"url":"https:\/\/www.genesisdigital.co\/blog\/learn\/marketing\/video-marketing\/snowball-effect-script-writing\/","url_meta":{"origin":3759,"position":0},"title":"The Snowball Effect of Script Writing","date":"May 30, 2017","format":false,"excerpt":"This is a deep dive continuation of an earlier article. If you haven\u2019t already, I encourage you to read the original post first. \u00a0Rock Solid Scripts that Sizzle If you want to read the entire Video Sales Letter article series from the beginning, start here\u2026 The First Five Critical Steps\u2026","rel":"","context":"In &quot;Featured&quot;","img":{"alt_text":"se both emotion and logic when you write your video sales letter script.","src":"https:\/\/i0.wp.com\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2017\/05\/The-Snowball-Effect-in-Script-Writing-1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3231,"url":"https:\/\/www.genesisdigital.co\/blog\/learn\/customer-loyalty-demands-great-customer-service\/","url_meta":{"origin":3759,"position":1},"title":"Customer Loyalty Demands Great Customer Service","date":"July 17, 2017","format":false,"excerpt":"I\u2019m going to go ahead and say the un-sayable\u2026 Customer Service is soul sucking work. There, it\u2019s out there. I said it, I meant it, I\u2019m here to represent it! But, whether we like it or not, difficult as it may be, it is AS IMPORTANT, if not MORE IMPORTANT\u2026","rel":"","context":"In &quot;E-Commerce&quot;","img":{"alt_text":"Loyalty","src":"https:\/\/i0.wp.com\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2017\/07\/Loyalty.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2836,"url":"https:\/\/www.genesisdigital.co\/blog\/tools\/webinarjam\/5-critical-steps-awesomely-successful-webinar-offers\/","url_meta":{"origin":3759,"position":2},"title":"5 Critical Steps to Awesomely Successful Webinar Offers","date":"March 5, 2017","format":false,"excerpt":"Which part of the webinar process would you say is the scariest? When we asked our customers this question, some said it\u2019s the first few seconds of the broadcast. Is my microphone working? Do I look like I know what I\u2019m doing? How do I sound? How do I look?\u2026","rel":"","context":"In &quot;WebinarJam&quot;","img":{"alt_text":"5 Critical Steps To Awesomely Successful Webinar Offers","src":"https:\/\/i0.wp.com\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2017\/03\/5-Critical-Steps-to-Awesomely-Successful-Webinar-Offers.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2405,"url":"https:\/\/www.genesisdigital.co\/blog\/learn\/marketing\/conversion-crushing-secrets-3\/","url_meta":{"origin":3759,"position":3},"title":"Conversion Crushing Secrets Three","date":"December 27, 2016","format":false,"excerpt":"This is Part Three of the \u201cConversion Crushing Secrets\u201d article series. Part One is available here, and Part Two is here. ===================================================================== Breaking the fourth wall is one of the key concepts to increasing conversions. I know that sounds like a tortured metaphor at the moment, but soon it shall\u2026","rel":"","context":"In &quot;Conversion &amp; Testing&quot;","img":{"alt_text":"ConversionCrush3","src":"https:\/\/i0.wp.com\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2016\/12\/ConversionCrush3.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3359,"url":"https:\/\/www.genesisdigital.co\/blog\/learn\/marketing\/video-marketing\/how-to-overcome-objections-from-people-who-want-your-product-but-arent-yet-convinced-its-right-for-them\/","url_meta":{"origin":3759,"position":4},"title":"How to Overcome Objections from People Who WANT Your Product, but Aren\u2019t Yet Convinced It\u2019s Right for Them","date":"September 22, 2017","format":false,"excerpt":"This is an expansion of an earlier article \u2013 if you haven\u2019t already, I encourage you to read the original post first. Rock Solid Scripts that Sizzle If you want to read the entire Video Sales Letter article series from the beginning, start here\u2026 The First Five Critical Steps to\u2026","rel":"","context":"In &quot;Featured&quot;","img":{"alt_text":"Your audience may already know they want your product or service, but they may need further convincing that they should spend money on it.","src":"https:\/\/i0.wp.com\/www.genesisdigital.co\/blog\/wp-content\/uploads\/2017\/09\/How-to-Overcome-Objections-from-People-Who-WANT-Your-Product-but-Aren\u2019t-Yet-ConvincedIt\u2019s-Right-for-Them.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2995,"url":"https:\/\/www.genesisdigital.co\/blog\/news-updates\/sms-marketing-turns-webinar-registrants-into-attendees\/","url_meta":{"origin":3759,"position":5},"title":"SMS Marketing Turns Webinar Registrants Into Attendees","date":"March 14, 2018","format":false,"excerpt":"Have you ever stumbled across an incredible webinar course and immediately signed up\u2026 only to completely space when the clock struck webinar time? We\u2019ve all been there. Between work, life and other commitments, it\u2019s hard to keep track of every digital event that comes your way. In fact, this happens\u2026","rel":"","context":"In &quot;Features&quot;","img":{"alt_text":"Use SMS To Boost Webinar Attendance","src":"https:\/\/i0.wp.com\/localhost\/webinarjam-blog\/wp-content\/uploads\/2018\/03\/Use-SMS-To-Boost-Webinar-Attendance.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/posts\/3759"}],"collection":[{"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/comments?post=3759"}],"version-history":[{"count":0,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/posts\/3759\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/media\/3760"}],"wp:attachment":[{"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/media?parent=3759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/categories?post=3759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.genesisdigital.co\/blog\/wp-json\/wp\/v2\/tags?post=3759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}