TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Security assessment for small non-profit

8 点作者 ogennadi超过 7 年前
Hey all,<p>I work with a small non-profit (~10 people) and we&#x27;d like an assessment done on our online presence (Wordpress, Roundcube email, Google Docs, Mailchimp, Twitter, Facebook) to ensure that it cannot be hijacked or destroyed.<p>While, I have a programming background, I&#x27;d like a professional&#x27;s take on how vulnerable we are to, for instance, ransomware or hijacking.<p>Are there any companies that specialize in security assessments of small organizations?<p>Alternatively, know of any good pen-testing checklists that cover 80% of what a professional would test?

1 comment

hluska超过 7 年前
I&#x27;m not going to entirely answer your question, rather, I&#x27;ll tell you about how we dealt with this issue in a non-profit that I co-founded.<p>Our organization had a large and strong online presence. Because of this and my technical background, I really wanted to get a security audit done. We looked around quite a bit and found that auditors fell into two camps. There were those who simply cost too much for our organization to possibly afford, and there were those who simply couldn&#x27;t demonstrate competence.<p>In the end, we decided on kind of a hybrid strategy. To start, we decided that all of our applications were 100% vulnerable to a motivated attacker. From there, we developed a strategy to mitigate the possible damage. For example, we took frequent backups and practiced to make sure we could fully restore from backups. And, we monitored the hell out of our stack in hopes of (hopefully) knowing quickly whether we had been compromised. The &quot;hopefully&quot; was actually an important part of our strategy - we assumed we were 100% vulnerable which meant that everything that was connected could also be compromised.<p>Then, we wrote some solid policy. In retrospect, writing the policy was about half cover our ass and half useful security. Our policy covered things like password reuse, frequency&#x2F;responsibility for backups&#x2F;automatic updates&#x2F;etc, and the like.<p>To summarize, at the time (this was 2007 ~ 2010 so the market may have changed), we couldn&#x27;t find a company to do a security audit within our budget. Rather than settle on an organization we had little confidence in, we developed a hybrid approach where we decided we were 100% vulnerable and enacted procedures to mitigate the possible damage.<p>Edit - Fixed a sentence that made no sense.
评论 #16280169 未加载
评论 #16273197 未加载