According to the White Hat 2018 “Website Security Statistics Report” there are many business verticals missing the mark on securing their websites. In the category of Accommodations/Food Services, 52% of websites are deemed as “Always Vulnerable.” Another 7% are considered “Frequently Vulnerable” (vulnerable at least 263 days a year). Healthcare and Social assistance sites have a whopping 50% labeled as “Always Vulnerable” with another 10% in the “Frequently Vulnerable” Category. Those are astounding statistics. 

At this point, you may be thinking to yourself, we’re not in that vertical so we’re fine. Or you may be thinking your company’s website is not in your jurisdiction, so you have nothing to worry about. What I think about when I read this report is not my concerns related to our website, but how do I protect my end users who are visiting these vulnerable sites? 

If you have folks that travel, order food, schedule catering, look up recipes, they are ultimately going to be visiting some of these sites. Many of these sites will be whitelisted on your web filter. So, then what? 

It starts with some basic blocking and tackling; reviewing gateway and end point settings, then patch, patch, and patch some more. Fully patched systems with the correct system settings render the vast majority of the low and mid-level threats null. 


After the patching and settings work is complete it is time to start thinking about how you can proactively identify indicators of compromise. Depending on your solution, your gateway and endpoint products may give you this information, but you need to make sure it is effectively correlated. Even if your endpoint and gateway talk to each other, you should still start thinking about vulnerability scanning and analysis or entry level SIEM. This will do the work that you don’t have the time to do, can’t do, or simplify the work that you are already doing if you are looking at log data. 

Proactive Security is an area that most small-mid and mid-size businesses neglect either because of the time-consuming nature, the lack of expertise of knowing what to look for, or both. There is a ton of good info out there to help you get up to speed as well as many open source products that you can take advantage of. Obviously, we can help in this area as well. But whether you engage us or not, get engaged in the next level of security before you are calculating your own cost of remediating a serious threat. 

To check out the White Hat report, visit their website at