How to Zombie-Proof Your Website

Feb 26, 2014 | 2  min
author Pyxl Development
FacebookTwitterLinkedIn

With the return of The Walking Dead, zombies are on the hearts and minds of many Pyxlites.

Zombies come in many forms, from slow ones (Romero, The Walking Dead, etc.) to fast ones (28 Days Later, Left 4 Dead, etc.) and every combination in between.

As such, there are also many types of online zombies who are hurting your site, either intentionally or not. These zombies could be users who unintentionally leave out information on forms or hackers who are intentionally creating chaos.

Here are a few ways to protect yourself from the online undead:

1. Front-end and backend validation on forms.  

Creating front-end validation to keep users from submitting incorrect, missing or harmful form data is the first step to protecting your site.  Validation on the backend is just as important.  The amount of users that have JavaScript disabled is frightening. It’s estimated that one out of every 50 users disables JavaScript and is therefore able to bypass the front-end validation your form has in place. This is why backend validation is non-negotiable. Backend validation will also protect against SQL injection so these online zombies can’t destroy the work you’ve put into place.

2. Keep all aspects of your site patched.  

From the CMS and the database to the web server and the plugins installed, keeping everything patched to the latest security level will help keep your site from being exploited by security vulnerabilities.

3. Don’t use easy-to-guess passwords.  

Here are a few basic guidelines to remember when setting up a password. Avoid using:

  • Dictionary words
  • Your partner, child or pet’s name, even in combination with a number
  • Your date of birth in any form
  • Anything about you that could easily be guessed (i.e. your college, your employer’s name, your hometown, etc.)
  • Commonly guessed passwords, such as “password,” “letmein,” “1234,” “love,” “money,” etc.

4. IP restrict things that aren’t going to be accessed by the public.

While IP spoofing is usually an easy game for experienced hackers, simply using the combination of an IP requirement and a strong password will be enough to deter somebody that is looking for a quick exploit.

5. Load test, load test, load test.  

Trying to fix a site in the middle of a heavy load is much more difficult than just making sure you have enough bandwidth available from the start.

As you can see, some of the online zombies are out looking for blood, while others are just stumbling around and happen upon easy prey.  Either way, taking a few basic steps and remembering the military’s 7 Ps – proper planning and preparation prevents piss poor performance – will ensure you are protected against the virtual undead.

 

Updated: Apr 13, 2022

Fuel Your Growth: Pyxl’s Digital Services and AI Solutions

What's New

Latest trends and insights
Introduction to Integrating HubSpot and Generative AI Solutions
Feb 20, 2024 | 5  min

In the rapidly evolving technology landscape, the strategic integration of generative AI solutions with HubSpot’s comprehensive data platform stands out as a pivotal advancement for ...   Read more

author Kati Terzinski
Annual Business Planning: A Step-by-Step Guide
Nov 14, 2024 | 3  min

As the year winds down, it’s a pivotal time for businesses to reflect, analyze, and plan for the year ahead. End-of-year annual business planning is ...   Read more

author Julia Smeltzer
How Defining Your Total Addressable Market Drives Business Growth
Nov 12, 2024 | 4  min

Imagine you could pinpoint exactly where your next big customer is coming from—and focus your marketing dollars where they’ll bring in the highest returns. Sounds ...   Read more

author Taylor Farace

1033 Demonbreun Street

Suite 300

Nashville, TN 37203


677 King Street

3rd Floor

Charleston, SC 29403


Phone: 615-647-6792

© 2024 Pyxl, Inc. All rights reserved. | Privacy Policy