If you’re taking your website or web app security seriously having strong and reliable processes and workflows is essential. Here’s an extensive and concise website security checklist that covers most critical aspects from identity and access management to CDNs and firewalls. I hope you find it helpful and it helps you create effective and well-structured security processes and procedures. Software and dependencies: Keep all your IT systems patched and up to date (servers, CMS, frameworks, libraries, modules/plugins, 3rd party tools, services, etc.). If you have… Read More »Website security checklist – a complete guide on protecting your website or web app
Having a visual way to explore the database, run queries, take backups, view database schema, etc. is oftentimes quite handy. If you have your favorite SQL client and/or if you feel like using a CLI might not be the best choice for your situation, here’s a quick step-by-step guide that on connecting to AWS Aurora using a desktop client. Finding necessary connection info in AWS console Log in to the AWS console Go to RDS Click Database instances Select the instance you want to connect… Read More »Connecting to AWS Aurora database using SQL client
If your Salesforce instance is configured to send email messages on your behalf using your domain, and those messages end up being filtered or even blocked as spam, you need to properly configure email settings within Salesforce and DKIM and SPF records using your DNS provider. These settings will add proper authentication headers to your email messages, which allow receiving email servers and spam protection filters to identify such messages as legit communications coming from you via an authorized email provider. Note: old vs new… Read More »Improving email deliverability in Salesforce – configuring DKIM and SPF records
Read More »Password management and sharing with 1Password
Password managers such as 1Password provide numerous benefits and features while reducing risks, simplifying a lot of processes, and improving our online experience. Moreover, they make us less vulnerable to cyberattacks while improving operational efficiency and collaboration. Key benefits include secure password storage, access, and sharing; ease of use on various browsers, devices, and operating systems; enforcing best practices such as using complex unique passwords that you don’t have to remember; multifactor authentication options; strong password generation and more.