by Mark | Jan 5, 2017 | Content Management Systems
We have previously mentioned this infographic in some of our social media feeds (Twitter and Facebook). We thought it might be helpful to provide this on our blog as well (with the author’s permission). In our opinion, it is a good perspective of the three major content management systems. Clicking on the infographic will open a new browser window/ tab with the full article.
Presented by Skilled.co (they have further information supporting this infographic on their site)
by Mark | Dec 20, 2016 | Web Security
As we all know, SSL certificates help protect the information transmitted between the web server and the client. Given the increasing cyber security attacks (and associated media coverage), data breaches and theft of payment processing data, we thought it appropriate to remind readers of the importance of SSL certificates.
Vivek Ram is a Technical Blog Writer from Comodo. He writes about information security, focusing on web application security. He provided the following information we wanted to share with readers of our blog. Many thanks to Vivek for providing this article.
“As a small business owner or even the owner of a larger company or ecommerce site, cyber security news about a data breach in payment processing on a website may be just one of the things that keep you up at night.
The good news is that cyber security consultants and professionals can develop plans, run a network security audit and even develop a network security policy that is designed to keep this type of data safe from hackers and breaches.
However, there are also some very simple security measures that can be put in place to provide encryption security between the server and the browser. This is known as SSL or Secure Sockets Layer and it has been the technology in place to protect data transmitted online since its introduction in 1994.
Today, the use of the new version of SSL, Transport Layer Security or TLS, is based on the early SSL technology. Even through TLS is the correct name, most of the Certificate Authorities and IT professionals still refer to it as SSL.
To protect your website and the information transmitted between the web server and the client, SSL certificates provide authentication and encryption. To understand how this provides both customer and user protection as well as protects the site itself, consider the following essential features, factors and functions. ”
The Trust Factor
“When existing customers or new prospective customers arrive at your website, the first thing they will look at is the quality of the landing page. However, once they start adding items to their cart and going through the checkout process, most customers will have taken a glance up at the address bar or to the sides of the page.
What they are looking for is the universal sign of online security. This is the padlock in the address bar that indicates they are on a site using SSL technology. Now, there is also the full green address bar which signifies the use of an EV SSL or Extended Validation certificate. This is the highest level of validation possible through any CA and for any type of website. Most customers aren’t certain about how the technology works, but they do recognize the need to have that padlock and perhaps the green bar present.
Glancing to the side or the bottom of the page will confirm the use of a specific Certificate Authority (CA). All of the major CAs will have their own site seal. This is a graphic that is used to designate the security of the website and the use of a particular product by a particular CA.
With these things in place, your website will have a decrease in the amount of abandoned shopping carts, something that is common if the customer gets through the selection process and then realizes on the checkout page that the padlock or green bar isn’t present.
However, and even more importantly, it makes your website safe for your customers to use. This preserves the reputation of your website and your company.”
Full Encryption at 256 Bits
“The use of SSL/TLS certificates also provides full encryption at the industry standard 256 bits. This encryption and decryption are done through the use of a pair of keys. These two keys use Public Key Infrastructure or PKI to provide internet security protection for online data.
The public key is used to encrypt data between the browser and the server. The public key is available to all because it is public. However, it is only recognized by one unique private key.
The private key is located on the server that hosts the website. When data comes in encrypted by the public key, it is unreadable unless it is decrypted by the private key. This protects all data transmitted from the website including financial information, personal information or even general information.
The public and private key are actually a long string of what looks like random numbers. They are able to recognize each other through a complicated mathematical relationships that is never duplicated and is completely unique.
The 256 bit encryption is virtually impossible to hack or break, even with brute force types of hacking attempts. The level of encryption offered by SSL certificate technology has changed over time and will continue to evolve as computer systems advance.”
Validation and Verification Process
“To further provide complete protection to your website against spoof websites or fraudulent website trying to look like your site, the CAs have to follow a rigid and very complex process to verify and validate the application for any type of SSL certificate.
This is based on the AICPA/CICA WebTrust for Certification Authorities Principles and Criteria and outlines what verifications must be completed for the various SSL certificates at the different validation levels.
As hackers or spoofing sites have to provide the necessary information and this has to match with records on file with a wide variety of databases and trusted sources, it makes it impossible for these criminals to be able to obtain an SSL certificate for those fraudulent sites. This not only protects your website but with the SSL certificate in place, it will also protect your customers.”
by Mark | Dec 8, 2016 | Usability, Web Accessibility
I had the opportunity to speak with Glenda Sims (Deque) about all the activities happening with WCAG (Web Content Accessibility Guidelines) these days. In this 5 minute overview, she discusses those aspects important to web professionals everywhere. The full 22 minute discussion is available to our members (once you login, scroll down to find the link).
In a nutshell, there is a great need for those who have a solid background in making sites accessible. The demand far exceeds the available work force.
During our discussion, Glenda mentioned these resources. Interested parties may wish to check them further.
Best always,
Mark DuBois
Community Evangelist and Executive Director
by Mark | Nov 1, 2016 | Content Management Systems, JavaScript, Semantic Web, State of the Web, Web Accessibility
As you know, we are big proponents of accessibility. We believe that content should be available to anyone at any time on any device. As 2016 draws to a close, it has become apparent that many web pages rely heavily on JavaScript (and associated frameworks). It would appear the pendulum has swung away from semantic markup towards dynamic/ generated content.
Concerns
One nagging question keeps coming to my mind – are we preventing access for some (because of reliance on these frameworks)? Although anecdotal, I ran various websites I use on a daily basis through the Functional Accessibility Evaluator (and similar tools). Some received scores as low as 29 (out of 100) resulting in automated comments such as “accessibility was not considered in the design of the website.”
Taking this one step further, I turned off JavaScript in my browser (Chrome in this case). Some of the sites I use on a daily basis (for example my school email) were rendered useless (I did receive a message that JavaScript needed to be activated and if I had problems, I could always use Internet Explorer). Similarly, the learning management system used predominantly at my school was not functional without JavaScript. As I understand, not all assistive technologies fully embrace JavaScript. This would seem to be a problem.
Let’s discuss further
I am not trying to point a finger at specific sites, I seek a broader understanding of the current state of web development. This begs the question – what has happened to graceful degradation? Are we relying too much on JavaScript? As we support web professionals (and aspiring web professionals), we seek to begin a discussion on this topic. Are we making the WWW less inclusive as we rely more on frameworks and content management systems? Have we overlooked something important? We look forward to your comments and insights.
Best always,
Mark DuBois
Community Evangelist and Executive Director