Close
Home
One Topic - Three Distinct Views:  The Vanguard View | Subscribe
Let Vanguard Technology help you with your website  Contact Us

Partner With Vanguard

Beautifully designed impactful websites for your organization and budget
 

Web Smarts - Business Savvy

We’ve been building websites since 1998

We are trusted advisors to Over 50 Active Clients within several industries including associations and nonprofits, healthcare, financial services, retail, B2B and more.

We Are
Trusted
Partners

After we deliver a quality website on time and within your budget, we will be there for when it really counts. We will be proactive, consultative and strategic after we launch your website.

We Are
Integration
Experts

We’ve integrated with virtually every AMS system on the market as well as most LMS, publication, advocacy and career center applications. Our company was founded on custom development.

We build websites that are easy to edit, manage and design using the best content management system on the market, Sitefinity CMS.

Our Clients Are Our Partners....

John Wurm

Membership & Communications Director
Minnesota Council of Nonprofits

The team at Vanguard helped us think about our digital presence from the perspective and needs of our users, while holding true to the values our organization espouses.

Connect With Us

On-Demand Webinar

Improve Your Webcopy

Sitefinity 13

With Improvements to Asset Management, Classifications and Redesigned Personalization, is it time to consider an upgrade to Sitefinity 13?

The

Vanguard View

Technology articles about one topic from the perspective of Leadership, Marketing and IT professionals .

2020 Volume 2 - Leverage Video and Search to Quickly Improve Your Website

Cyber Security: What do you need to know?

Dec 20, 2019, 16:44 PM by Mark Havelka
How secure is your website? Learn what's out there to protect you and your users.

TLS 1.3 is published and somewhere on the horizon.  TLS 1.0 & 1.1 are on their way out and will be deprecated in 2020.  What does that mean to you?  Unless you are a developer, probably nothing. Here at Vanguard, it is a reminder that cyber security is not a goal achieved and ignored, but something requiring regular maintenance. 

History of Cyber Security

Before we dive into it, let’s talk a little bit about where cyber security began. Diffie-Hellman, the first public key algorithm was published in 1976.  Some variation of the algorithm has been used as a key exchange in partnership with another public key algorithm RSA since SSL (Secure Sockets Layer) was first introduced by Netscape in 1994.  SSL is a protocol that secures the connection between the server and the client. Back then an acceptable DES, an encryption scheme also introduced in the late 70’s, was considered secure with a key as small as 56 bits.  DES has long since been considered insecure.  As time progressed, and encryption algorithms breaks and hashing algorithms encounter collisions were found, there was a need for an updated standard for secure communication. SS2 was followed by SS3.  In 1999, the protocol was renamed TLS and it is now in its third iteration. Many people still use SSL and TLS interchangeably. In addition to bug fixes and replacing outdated algorithms with the latest, TLS 1.3 will make secure browsing faster.  When a user connects to a server securely, the first step is called the SSL handshake.  The handshake will be altered in a way that makes it both more secure and faster.  Windows has not announced a release date for an operating system that includes TLS 1.3, and as mentioned in the first paragraph, we eagerly await that news. 

Why worry about cyber security?

We can communicate anywhere in the world and our messages can be intercepted anywhere along the way.  It is important to have confidence that our message and the subsequent response weren’t altered.  We can’t allow eavesdropping, as we have an obligation to our users and their data.

There’s no such thing as a perfectly secure network.  We can take comfort in the fact that breaking modern encryption is impractical, but every advance in processing ability, every advance in applied math or cryptography, and every day that passes brings every algorithm closer to obsolescence.

Modern Security

Every computer that can use SSL has a cypher suite, or a collection of algorithms, in the operating system that it can use to communicate.  When you make a secure connection, your computer negotiates with the server for the most recent protocol and the best algorithm shared by both.  If you dust off the giant box that’s been in your closet since the early 1990’s, you won’t be able to securely browse the web at all as none of the software at that time is still considered secure.

By holding an SSL certificate, you give the public the ability to verify your website’s identity and a method to communicate securely. Click the lock icon in the upper left corner of your browser window next to the URL.  You should be able to verify the site identity, the issuer of the certificate, the expiration date of the certificate, and the details of the encryption algorithm and protocol in use.

Cyber Security as an Industry

The greater tech industry takes security so seriously, it’s allowed SSL capability to influence their products.  In 2014, Google went as far to downgrade rankings for websites that doesn’t meet their security standard.  Early this year Google Chrome made SSL the default on anything without “http://” in the request.  Other browsers are following suit.

What’s out there?

Savvy consumers are moving beyond just SSL to secure their data.  The popular mobile browser Opera introduced VPN in March.  Now there is an entire market of new browsers with VPNs built in.  While the content of the message being sent may be encrypted, some data must remain readable so that devices in the network can route the message.  Now, from the user’s location, all readable data only shows the location remote VPN server, not the target site.

Beyond VPN is TOR.  TOR uses onion routing, a technique of sending an encrypted message through a series of intermediate computers before connecting with the desired site. This gives users anonymous communication with a server.  The user sends an encrypted message through a series of intermediate computers before connecting with their desired site.  Because of the multiple layers of encryption, the user’s identity along with the data sent and requested is hidden from anyone listening along the way.  TOR has a world-wide network and a dubious reputation.  Recently BBC news attempted to use it to allow their banned content to be viewed in China.  It was also the primary method for connecting to the Silk Road black market before it was shut down in 2014.

Where there is crime, there needs to be security

Criminal activity and the desire for personal privacy by users will continue to drive cyber security.  It is important that you and your organization understand cyber security and take the necessary steps to ensure your site’s safety.

We at Vanguard will continue to provide the best advice we can for you and your members. As we await the release of TLS 1.3, we are continuing to ensure the highest quality security to our clients.

Load more comments
Comment by from

Vanguard Tips & Tricks

We provide helpful hints you never knew you needed for our clients. Check out "Vanguard Tips & Tricks" to learn quick and simple hacks to make managing your website easier than ever.

Cyber Security: What do you need to know?

Dec 20, 2019, 16:44 PM by Mark Havelka
How secure is your website? Learn what's out there to protect you and your users.

TLS 1.3 is published and somewhere on the horizon.  TLS 1.0 & 1.1 are on their way out and will be deprecated in 2020.  What does that mean to you?  Unless you are a developer, probably nothing. Here at Vanguard, it is a reminder that cyber security is not a goal achieved and ignored, but something requiring regular maintenance. 

History of Cyber Security

Before we dive into it, let’s talk a little bit about where cyber security began. Diffie-Hellman, the first public key algorithm was published in 1976.  Some variation of the algorithm has been used as a key exchange in partnership with another public key algorithm RSA since SSL (Secure Sockets Layer) was first introduced by Netscape in 1994.  SSL is a protocol that secures the connection between the server and the client. Back then an acceptable DES, an encryption scheme also introduced in the late 70’s, was considered secure with a key as small as 56 bits.  DES has long since been considered insecure.  As time progressed, and encryption algorithms breaks and hashing algorithms encounter collisions were found, there was a need for an updated standard for secure communication. SS2 was followed by SS3.  In 1999, the protocol was renamed TLS and it is now in its third iteration. Many people still use SSL and TLS interchangeably. In addition to bug fixes and replacing outdated algorithms with the latest, TLS 1.3 will make secure browsing faster.  When a user connects to a server securely, the first step is called the SSL handshake.  The handshake will be altered in a way that makes it both more secure and faster.  Windows has not announced a release date for an operating system that includes TLS 1.3, and as mentioned in the first paragraph, we eagerly await that news. 

Why worry about cyber security?

We can communicate anywhere in the world and our messages can be intercepted anywhere along the way.  It is important to have confidence that our message and the subsequent response weren’t altered.  We can’t allow eavesdropping, as we have an obligation to our users and their data.

There’s no such thing as a perfectly secure network.  We can take comfort in the fact that breaking modern encryption is impractical, but every advance in processing ability, every advance in applied math or cryptography, and every day that passes brings every algorithm closer to obsolescence.

Modern Security

Every computer that can use SSL has a cypher suite, or a collection of algorithms, in the operating system that it can use to communicate.  When you make a secure connection, your computer negotiates with the server for the most recent protocol and the best algorithm shared by both.  If you dust off the giant box that’s been in your closet since the early 1990’s, you won’t be able to securely browse the web at all as none of the software at that time is still considered secure.

By holding an SSL certificate, you give the public the ability to verify your website’s identity and a method to communicate securely. Click the lock icon in the upper left corner of your browser window next to the URL.  You should be able to verify the site identity, the issuer of the certificate, the expiration date of the certificate, and the details of the encryption algorithm and protocol in use.

Cyber Security as an Industry

The greater tech industry takes security so seriously, it’s allowed SSL capability to influence their products.  In 2014, Google went as far to downgrade rankings for websites that doesn’t meet their security standard.  Early this year Google Chrome made SSL the default on anything without “http://” in the request.  Other browsers are following suit.

What’s out there?

Savvy consumers are moving beyond just SSL to secure their data.  The popular mobile browser Opera introduced VPN in March.  Now there is an entire market of new browsers with VPNs built in.  While the content of the message being sent may be encrypted, some data must remain readable so that devices in the network can route the message.  Now, from the user’s location, all readable data only shows the location remote VPN server, not the target site.

Beyond VPN is TOR.  TOR uses onion routing, a technique of sending an encrypted message through a series of intermediate computers before connecting with the desired site. This gives users anonymous communication with a server.  The user sends an encrypted message through a series of intermediate computers before connecting with their desired site.  Because of the multiple layers of encryption, the user’s identity along with the data sent and requested is hidden from anyone listening along the way.  TOR has a world-wide network and a dubious reputation.  Recently BBC news attempted to use it to allow their banned content to be viewed in China.  It was also the primary method for connecting to the Silk Road black market before it was shut down in 2014.

Where there is crime, there needs to be security

Criminal activity and the desire for personal privacy by users will continue to drive cyber security.  It is important that you and your organization understand cyber security and take the necessary steps to ensure your site’s safety.

We at Vanguard will continue to provide the best advice we can for you and your members. As we await the release of TLS 1.3, we are continuing to ensure the highest quality security to our clients.

Load more comments
Comment by from

Case Studies

Vanguard conducts thorough preliminary investigative work to ensure your website is built to cater specifically to your target audience and meet your organization’s goals. Check out some of the case studies on some of our most recent client success stories.  

Follow Us On Social Media Twitter Facebook YouTube LinkedIn

What Can Vanguard Do For You?

As your organization grows and evolves, your website should as well. Whether you are looking to generate more traffic, implement custom functionality, mobile compatibility, integrate your systems, or give your site a complete redesign, Vanguard Technology is your go-to web partner. Reach out to us with your current concerns with your website, and our experts will happily provide a solution.