Skip to content

What is SQL Injection and How to Prevent This Attack?

SQL Injection is one of the most dangerous vulnerabilities for websites and online applications. It occurs when a user adds untrusted data to a database query, for example, when filling out a web form. 

If data injection is enabled, attackers can create user input to steal valuable data, bypass authentication, or corrupt records in your database.

 There are different types of SQL injection attacks, but in general, they all have a similar cause. Untrusted data that the user enters is concatenated with the query string. 

Therefore, user input can change the original intent of the query and lead to numerous security issues

In this article, we cover and recommend some best practices for technicians to use in preventing SQL Injection attacks. Keep reading and understand more about these practices! 

Do Not Rely on Client-side Input Validation

Client-side input validation is an excellent practice to prevent SQL Injection attacks. With client-side input validation, you can now prevent invalid information from being sent to your system logic. However, this only works for users who have no bad intentions and want to use the system as designed. 

Providing the user with direct feedback that a certain value is not valid is very useful and simple. Therefore, you should use client-side validation to help your user experience. 

When looking at SQL injection, this is not a method you should trust. You can remove client-side validation by changing some Javascript code loaded in your browser. 

Also, it is very easy to make a basic HTTP call to the backend in a client-server architecture with a parameter that causes an SQL injection. Maybe using tools the old-school curl commands.

You should validate the server-side, preferably as close to the source as possible. In this case, you create the SQL query. Anything a client sends you should be considered potentially harmful. So, in this case, relying on client-side validation for SQL injection is a terrible idea.

Use Database Engines With Restricted Privileges

When creating a database user for your application, you should think about this user’s privileges.

Does the application need to be able to read, write and update all databases? How about truncating or dropping tables? If you limit your application’s privileges on the database, you can minimize the impact of SQL injection. 

It is advisable not to have a single database user for your application, but to create multiple database users and connect them to specific application roles with different privileges. Security issues are likely a ripple effect, so you should be aware of all relationships to avoid heavy damage.

Use Ready-made Instructions and Query Parameterization

Many languages have built-in features available that help prevent SQL injection. When writing SQL queries, you can use something like a ready-made statement to compile the query. 

With a ready-made statement, we can perform query parameterization, which is a technique to dynamically create SQL statements. You create the base query with some placeholders and securely attach user-supplied parameters to those placeholders.

When using a real ready-made statement and parameterized queries, the database itself actually takes care of the escape. First, it builds the query execution plan based on the query string with placeholders. 

In the second step, the (untrusted) parameters are sent to the database. The query plan is already created, so the parameters no longer influence this. This avoids the injection completely.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Safetica is a leader in SoftwareReviews’ Data Loss Prevention Data Quadrant

According to the comprehensive market reviews compiled by SoftwareReviews, Safetica has earned its place in the DLP Leaders’ quadrant. Placing just behind the overall quadrant winner McAfee, Safetica was praised for its Net Emotional Footprint and for providing exceptional support.

Both companies were awarded a gold medal and named winners of the 2021 quadrant. Safetica was top rated in Ease of implementation and Ease of data integration, scoring second in Product strategy and rate of development, and Vendor support.

The Infotech report is based only on extensive end-customers’ ratings. We are extremely proud to be one of the winners and for being top rated in ease of implementation and data integration, which are notorious challenges in the DLP sector.

says Richard Brulík, CEO of Safetica.

Category overview
SoftwareReviews rated DLP solutions according to feedback provided by their end-users during a comprehensive online survey. Vendors are evaluated on several factors: 11 capabilities, product features, likeliness to recommend and emotional footprint. A composite score is calculated from those factors. In 2021, McAfee DLP received a 8.9/10 composite score, followed closely by Safetica with 8.7. You can read the whole report here.

Quadrant gold medalists
The DLP quadrant is spread across the axes of product features and user satisfaction and vendor experience and capabilities. The leader’s quadrant features four solutions: McAfee DLP, Safetica, Trustwave DLP and Forcepoint Data Security Suite. DLP overview was populated in only two other quadrants: product innovators (Trend Micro DLP and Symantec DLP) and challengers (Sophos Enduser Protection Bundles and Check Point DLP). The Service star quadrant remained vacant in the 2021 evaluations.

Vendor capability awards
For all of the 11 capabilities, SoftwareReviews created a comprehensive review, with the highest-ranking solution winning the “Top rated” award in these capabilities. In their evaluations, customers gave Safetica the highest score in Ease of implementation and Ease of data integration, second in Product strategy and rate of development, and Vendor support.

About SoftwareReviews
SoftwareReviews is a division of Info-Tech Research Group, an IT research and advisory firm established in 1997. Backed by two decades of IT research and advisory experience, SoftwareReviews is a leading source of expertise and insight into the enterprise software landscape and client-vendor relationships. By collecting real data from IT and business professionals, the SoftwareReviews methodology produces detailed and authentic insights into the experience of evaluating and purchasing enterprise software

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

IPEVO 愛比科技 DO-CAM 視訊協作攝影機榮獲 GOOD DESIGN AWARD 2021

IPEVO 愛比科技 DO-CAM 視訊協作攝影機榮獲 GOOD DESIGN AWARD 2021

與德國「IF」、德國紅點「Red dot」、美國「IDEA」,並列為全球最具權威及影響力之四大設計獎項的日本優良設計獎 GOOD DESIGN AWARD,已於10月20日公布得獎作品。

今年 GOOD DESIGN AWARD 收到來自世界各地共5835件參賽作品,經由80多位專業評審評審評選後,IPEVO 愛比科技DO-CAM 視訊協作攝影機榮獲 GOOD DESIGN AWARD 2021 教材、教育用品類獎項,除獲得國際大賞的肯定,更被評審評選為最愛的設計之一,並受邀在GOOD DESIGN東京丸之內展覽場展出,展期為10月20日至11月24日。

在 GOOD DESIGN 擔任評審之一的日本知名設計師 Ricca Tezuchi,是プロペラデザイン(propeller design)創辦人,也曾是深澤直人在 IDEO JAPAN 的同事,並在與深澤直人擔任無印良品與±0的設計總監時,合作開發過許多產品。

Ricca Tezuchi 女士評選DO-CAM 視訊協作攝影機為本次得獎作品中的最愛。

她提到,「這是一款可以輕鬆拿在手上的視訊攝影機。使用後,往下按便可以折疊起來,變成像筆盒一樣。這個獨特的設計考慮到了視訊攝影機在未使用的狀態下,亦能融入日常生活中而不會感到格格不入,因此我相當推薦這個產品。」

DO-CAM 視訊協作攝影機考量到遠距教學及遠端協作的實際應用,以特殊結構,創造方便攜帶及融入各種教育及工作場域的設計,以及可一鍵翻轉影像,在人物影像及文件影像中迅速切換的便利功能,是邁向混成教學及混合式工作不可缺少的數位工具。

獲獎連結   https://bit.ly/3GmvOsj

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。

My Company Suffered a Ransomware Attack: Should I Pay the Ransom or Not?

Ransomware attacks are one of the biggest fears of companies today. Imagine having to use your business resources to pay cybercriminals. This is a reality that happens.

However, in case your company suffers a ransomware attack, what is the best option: To pay or not to pay the ransom? That is exactly what we will talk about in this article.

Keep reading and understand how to handle this type of situation.

What is a Ransomware Attack?

A ransomware attack consists of blocking data from computers and servers through encryption.

The hacker blocks this data and demands the payment of the ransom through a type of digital currency, such as Bitcoin.

The promise made is that the data will only be released when the ransom is paid.

How Does a Ransomware Attack Work?

One of the biggest risks to a company’s information security is cyberattacks, as hackers are aware of possible system security flaws due to data transfer between the various devices connected to the server.

The moment a hacker identifies a security loophole in the system, they prepare their attack.

As far as ransomware is concerned, computer files are encrypted and ransom is requested for the data to be released again.

It is possible to fix these flaws before hacker attacks happen through system updates, but this does not always happen in a timely manner and hackers are usually quite quick in their actions.

One of the ways to avoid ransomware is to keep operating systems always up-to-date, as malware easily invades when it perceives a system failure.

Another way ransomware attack can happen is through phishing which, in practice, occurs through an email sent with a strange attachment or code to your inbox.

This email arrives disguised as a known sender, such as an employee of the company itself, causing a person to open the attachment without so much suspicion.

By clicking on such an attachment, the virus gains access to all computers and devices connected to the system and the ransomware begins to encrypt the files until they are all taken “hostages”, and remain so until the desired payment is made to the cybercriminals.

It is important to mention that, although the hacker promises to release access to the data after payment, this may not happen, as these people are not trustworthy to simply believe their words without guarantees.

Also take the opportunity to read: The pillars of information security: part 2

Learn How to Handle a Ransomware Attack

In case a ransomware attack happens in your company, you must immediately notify the IT team who will be responsible for finding the last backup performed on the system.

When it occurs at home, the ideal is to disconnect the computer from the network and look for a professional who is an expert in information security to help you solve the problem.

One of the ways to protect yourself from these hacker attacks is to have an antivirus in your system, always kept up to date, in addition to performing regular backups of your data, preparing for possible losses in the future.

To Pay or Not to Pay for a Ransomware Attack?

Experts on the subject defend the idea that not paying for ransomware attacks is the best option because, as already mentioned, cybercriminals offer no guarantee that they will release the data later.

In some cases of this malware, it is entirely possible to solve the problem with the use of a good antivirus, for example.

When it comes to recovering data such as personal photos, legal documents, medical reports, and such, you must decide between the risk of paying and getting them back or not.

In the end, the most appropriate way to avoid these hacker attacks is to keep your system constantly protected by antivirus and security tools that cover cyberattacks like this one.

Furthermore, it is important to keep backups always up to date and your data stored in the cloud as another secure way to protect yourself.

It is worth noting that making payment for this type of hacker attack may even be considered illegal, as threats to sell or disclose confidential information on the dark web is a form of extortion, which is a crime under the law, as reported on Welivesecurity.

This is one of the cases where relying on a company that specializes in digital solutions becomes essential for good performance and data security in your company.

Was this content useful for you? Also read: Is Your Company Really Prepared for a Cyberattack?

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Data Center VS Cloud, let the fight begin!

The fight of the century: Data Center VS Cloud! Let’s go!

In this blog we have always been eager for fights or competitions of whatever we please. We are like that, like fierce pokemon trainers who want to finally find out who has the greatest capabilities to win. They have praised us for it, they have hated us for it, but it does not matter, the point here is not having fun, but to give the most complete information about the litigants and the battle, so that the user can see closely who they should choose in the future. For all these reasons, today we have in our very own ring Data Center VS Cloud.

How to choose between a data center and Cloud storage?

When the decisive moment arrives, a company must decide about what it intends to do with data storage: “Do we send everything to the Cloud? Do we store our data right here, in our datacenter? Do we outsource them to a professional data center? After all, there are multiple factors, financial elements, the logistics of the company, different clauses and details. A lot of regulation to take into account that has you sweating when it comes to finding the correct answer.

The truth? In this article we are going to expose situations in which data centers beat the Cloud, because, for better or for worse, we are facing a foreseen victory.

Do you need more security?

It is true that the Cloud is no longer sooo in cloud 9 and both the Cloud and its computing and data storage solutions have made great progress in recent times. In fact, they offer a great infrastructure with protected access and the add-on of pay-as-you-go. But if you really want to have the appropriate protocols, compliance and security software, well, your data can be better and more secure in a data storage center, external or at home. There are many companies that offer external, professional and guaranteed data storage, which certifies that the information is your exclusive property and that the data will always be kept safe.

As we have said, storage security in IT Clouds is not as weak as some leaks of private pictures of celebrities have led us to believe. What’s more, the Cloud is often the first choice for a large number of companies, but there are certain nuances in Cloud storage that lead others to choose data centers. And there is a certain lack of control when choosing Cloud storage: problems with shared servers, lack of automatic backups, data leaks, fraudulent devices, vulnerable storage gateways, etc.

Combining infrastructure and profitability

If there is something that the clouds look like from the mainland, it is comfort and convenience, and so does the Cloud, something comfortable, agile… However, user fees can end up being quite expensive, depending on the type of services that one might need. An on-premise data center, in your own facilities, can also be one of the most expensive options, in addition that to manage it you must have a good security and IT team that takes care of regular updates and keeps it operational and always ready.

External storage might be the middle ground. Your own space within a data center or as part of a colocation package. If you think about it, you get the advantages of the Cloud without having to spend all that money that normally requires hosting data on a local data center. It is a very attractive option, considered by companies that have started getting consolidated and are now in full growth. Something more robust and reliable than the Cloud and without so many problems with the facilities.

Do you handle sensitive customer data?

Do you know when companies make up their minds quickly in this fierce fight between on-premise vs Cloud? When it comes to collecting, saving and using customer data that if leaked, lost or stolen would mean the destruction of their business, the private life of the person who trusted them or the public welfare in general. To give you an idea, Emperor Palpatine would never hang plans for The Death Star in the Cloud. Too risky.

Imagine then companies that compile and safeguard financial, political, medical, institutional, sensitive data… All of them choose to use physical data centers instead of the Cloud. And the same goes for telecommunications or social media companies. Physical centers are not the best thing ever, but the Cloud has proven itself more often to be vulnerable and easier to be violated more times.

You need a Cold Storage Location

When we talk about a Cold Storage Location we mean the storage of data that is completely offline, that is, they are not in the Cloud at all, they do not relate to the Cloud, they do not want the Cloud, they do not know what the Cloud is. Data is stored on safe physical means and then moved off-site in the event of a cataclysm. Like you know, a dana, a volcanic explosion, the Twister hurricane or a robbery attempt. This data storage option is often used by companies that have long-term compliance dates, financial institutions, brands threatened by ransomware attacks… They all see Cold Storage Location as the safest backup plan they can have.

Conclusion: Then, what about it?

Well, if we have to reach some conclusions, it must be said that storage in the Cloud is often convenient and has its place, but, of course, it is not the only option, nor is it the best for many companies. Data centers are the ones that best help companies, provide them with security, scalability and peace of mind. It is also the only alternative for companies looking for Cold Storage Location.

After this brawl, Cloud VS on-premise, you can take more into account the advantages and disadvantages of each one of them and make the best decision for your company and your customers’ data.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×