{"id":3790,"date":"2017-05-23T09:04:13","date_gmt":"2017-05-23T09:04:13","guid":{"rendered":"https:\/\/yeeply.com\/en\/blog\/?p=3790"},"modified":"2023-12-11T10:47:13","modified_gmt":"2023-12-11T08:47:13","slug":"database-security-and-how-to-secure-your-web-servers","status":"publish","type":"post","link":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/","title":{"rendered":"Web Security: how to secure your database and web servers"},"content":{"rendered":"<p>Numerous incidents of hacking attacks have demonstrated that among<strong> the most crucial issues to any business with an online presence is web server security<\/strong>. Web servers are among the<strong> most targeted areas of an organization<\/strong> due to the fact that they host sensitive data.<\/p>\n<p>Keeping a web server secure is as essential as keeping a <a href=\"https:\/\/yeeply.com\/en\/blog\/advantages-and-disadvantages-of-web-app-development\/\">web application<\/a> or website and the network surrounding it secure. If either one of these aspects is not well secured, your business is at peril.<\/p>\n<p>Even though <strong>keeping a web server secure seems like an overwhelming task<\/strong> that needs the expertise of a specialist, it is not impossible. Conducting painstaking research now can stave off data breaches in the future.<\/p>\n<p style=\"text-align: center;\">\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<\/p>\n<div class=\"bt-proyecto\"><a class=\"do-not-track\" href=\"https:\/\/yeeply.com\/en\/web-development\/?rel=EN-BT-proyecto-web#publish-project\" target=\"_blank\" rel=\"noopener\">WANT TO CREATE A WEBSITE? TELL US ABOUT YOUR PROJECT!<\/a><\/div>\n<p style=\"text-align: left;\">Irrespective of the operating system or web server software you use, an out-of-the-box configuration is typically insecure. It is therefore imperative that you take precautionary measures to ensure your web server is secure.<strong> The following are some tasks that are essential to securing a web server.<\/strong><\/p>\n<h2><strong>Eliminating Unnecessary Services<\/strong><\/h2>\n<p>You can\u2019t bank your security on default configurations and system installations. <strong>Typical default installations come with numerous network services<\/strong> that will not be used in the configuration of web servers. These network services include the RAS, print server service, remote registry services, etc.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-3794\" title=\"a monitor locked with a security lock and a chain\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/privacy-10x10-featured.jpg\" alt=\"a monitor locked with a security lock and a chain\" width=\"648\" height=\"425\" \/><\/p>\n<p>Having many services running on an operating system means that more ports with be left open, which results in more potential avenues for malicious users to exploit. All <strong>unnecessary services should be switched off<\/strong>. They should also be disabled to ensure that they don\u2019t automatically start when the system is rebooted.<\/p>\n<p>Additionally, switching off these services gives your server an extra <a href=\"https:\/\/yeeply.com\/en\/blog\/jakub-zalas-expert-web-development\/\">boost in performance<\/a> by freeing up hardware resources.<\/p>\n<h2><strong>Having a separate development, testing or production environment<\/strong><\/h2>\n<p>Developers find it easier and faster to develop an up-to-date version of a <a href=\"https:\/\/yeeply.com\/en\/blog\/top-5-examples-web-app-development\/\">web application<\/a> on the production server. Therefore, developing and testing of web applications are frequently done directly on production servers.<\/p>\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<p><a href=\"https:\/\/yeeply.com\/en\/landing\/download-ebook-checklist-web\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2020\/04\/EN-E4-Banner-blog-V2-1020x387-1.png\" alt=\"Ebook 4 Checklist Web\" \/><\/a><\/p>\n<p><strong>Newer versions of specific websites are usually available on the internet<\/strong>. The same applies to some content that should not be publicly available, e.g. directories such as \/new\/, \/test\/, or other subdirectories.<\/p>\n<p>Such web applications typically handle exceptions poorly, lack input validation, and have numerous vulnerabilities, which can be easily discovered and exploited by malicious users.<\/p>\n<p>Developers build specific<a href=\"https:\/\/yeeply.com\/en\/blog\/when-and-how-to-create-an-app-for-your-business\/\"> internal applications<\/a> that provide privileged web application access that normal anonymous users would not have. Applications of this type do not have restrictions because they are meant to only be accessed by developers. Unfortunately, in cases where a production server is used for development and testing, malicious users may discover such applications and use them to gain access to and compromise the production server.<\/p>\n<p><a href=\"https:\/\/yeeply.com\/en\/blog\/web-app-development-website-accessible-mobile\/\">Web application development<\/a> and testing should only be performed on servers that are not connected to the internet. They should not have a link to real databases.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3795\" title=\"stonewall between earth globe and laptop\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/apachesecurity.png\" alt=\"stonewall between earth globe and laptop\" width=\"551\" height=\"294\" \/><\/p>\n<h2><strong>Web Application Content and Server-Side Scripting<\/strong><\/h2>\n<p>System files such as logs and operating systems should be on a drive or partition <strong>separate from that hosting website files\/scripts and web applications<\/strong>.<\/p>\n<p>Experienced database administrators, such as those at <a href=\"http:\/\/www.remotedba.com\/consulting-services\/\">remotedba.com<\/a>, know that when hackers gain access to a web root directory, they can take advantage of other vulnerabilities and further escalate their privileges to gain access to the entire disc\u2019s data, including system files and the operating system.<\/p>\n<p>From that point, the hackers will have the ability to execute whichever operating system command they choose, giving them absolute control over the web server.<\/p>\n<h2><strong>Permissions and Privileges<\/strong><\/h2>\n<p><strong>Services permissions for network and file services play an important role in securing a web server<\/strong>. In case a malicious user uses network service software to compromise a web server engine, they can use the account that runs the network service to execute tasks.<\/p>\n<p>It is therefore important to assign the least privileges required for a particular network services to run. Equally, it is important to assign anonymous users minimum privileges required to access the site, web application files, data, and databases.<\/p>\n<h2><strong>Install All Web Security Patches on Time<\/strong><\/h2>\n<p>Having software that is fully patched is<strong> no guarantee that your server is fully secure<\/strong>. Nonetheless, it is imperative that you keep your operating system and the software running on it up to date using the latest security patches. Far too many incidents of hacking have occurred because malicious users exploited software and servers that were unpatched.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3796\" title=\"security lock visualization\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/internet-sicherheit-it-datenschutz-content.jpg\" alt=\"security lock visualization\" width=\"626\" height=\"305\" \/><\/p>\n<h2><strong>Ensure the Server is Monitored and Audited<\/strong><\/h2>\n<p>Ideally, all the logs present in <strong>a web security server should be kept in a separate area<\/strong>. There should be frequent checking and monitoring of operating system logs, website access logs, network services logs, and database server logs (such as Oracle, MySQL, and Microsoft SQL Server). Your company\u2019s DBA should always be on the lookout for abnormal log entries.<\/p>\n<p>Log files tend to be ignored yet they give all the information about attempted and successful hacks. <strong>If strange log activity is noticed, it should be immediately addressed and investigated to determine exactly what is happening.<\/strong><\/p>\n<h2><strong>User Accounts<\/strong><\/h2>\n<p>Unused default user accounts created during an operating system installation should be disabled.\u00a0There are a number of software that, following installation, create user accounts on the operating system. <strong>These accounts should be properly checked and changes made to permissions.<\/strong><\/p>\n<p>In addition to being renamed, built-in administrator accounts should not be used. Same applies to root users on Unix\/Linux installations. Administrators who access web servers should have their own accounts and appropriate privileges. As a matter of proper security practice, user accounts should not be shared.<\/p>\n<h2><strong>All Unused Application Extensions and Unused Modules Should Be Removed<\/strong><\/h2>\n<p>A default Apache installation will have many enabled pre-defined modules that are not typically used in a web server scenario unless they are specifically required. To prevent targeted cyber attacks against such modules, they should be turned off.<\/p>\n<p>The same goes for Microsoft\u2019s web servers \u2013 Internet Information Services (IIS). IIS is by default configured to serve numerous types of applications. The list of application extensions should only contain those that the web application or website will use.<\/p>\n<style type=\"text\/css\"><!--br {mso-data-placement:same-cell;}--><\/style>\n<p><a href=\"https:\/\/yeeply.com\/en\/web-development\/?rel=EN-BP-proyecto-web#publish-project\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2020\/04\/EN-cta-blogpost-proyecto-web.jpg\" alt=\"Proyecto Web\" \/><\/a><\/p>\n<p><strong><em>Author Bio:<\/em><\/strong><\/p>\n<p><em>Sujain Thomas is a database IT professional who works closely with DBA professionals and is keen on providing his clients with top-of-the-range DBA services to solve their data problems. To learn more about DBA, visit remotedba.com.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Numerous incidents of hacking attacks have demonstrated that among the most crucial issues to any business with an online presence is web server security. Web &#8230;<\/p>\n","protected":false},"author":2,"featured_media":8038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[115],"tags":[],"class_list":["post-3790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Web Security: Securing Your Database and Web Servers<\/title>\n<meta name=\"description\" content=\"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Security: Securing Your Database and Web Servers\" \/>\n<meta property=\"og:description\" content=\"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Yeeply\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YeeplyMobile\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-23T09:04:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T08:47:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"748\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yeeply\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:site\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yeeply\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/\"},\"author\":{\"name\":\"Yeeply\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\"},\"headline\":\"Web Security: how to secure your database and web servers\",\"datePublished\":\"2017-05-23T09:04:13+00:00\",\"dateModified\":\"2023-12-11T08:47:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/\"},\"wordCount\":1061,\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/web_security_online_lock.jpg\",\"articleSection\":[\"Web\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/\",\"name\":\"Web Security: Securing Your Database and Web Servers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/web_security_online_lock.jpg\",\"datePublished\":\"2017-05-23T09:04:13+00:00\",\"dateModified\":\"2023-12-11T08:47:13+00:00\",\"description\":\"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/web_security_online_lock.jpg\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/web_security_online_lock.jpg\",\"width\":748,\"height\":493,\"caption\":\"graphic lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/blog\\\/web-development\\\/database-security-and-how-to-secure-your-web-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Security: how to secure your database and web servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\",\"name\":\"Yeeply\",\"description\":\"A platform for the development of digital projects\",\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yeeply.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#organization\",\"name\":\"Yeeply\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"width\":360,\"height\":120,\"caption\":\"Yeeply\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YeeplyMobile\\\/\",\"https:\\\/\\\/x.com\\\/Yeeply_EN\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/yeeply\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/en\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\",\"name\":\"Yeeply\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"caption\":\"Yeeply\"},\"url\":\"https:\\\/\\\/yeeply.com\\\/en\\\/author\\\/yeeply\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Security: Securing Your Database and Web Servers","description":"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/","og_locale":"en_US","og_type":"article","og_title":"Web Security: Securing Your Database and Web Servers","og_description":"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.","og_url":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/","og_site_name":"Yeeply","article_publisher":"https:\/\/www.facebook.com\/YeeplyMobile\/","article_published_time":"2017-05-23T09:04:13+00:00","article_modified_time":"2023-12-11T08:47:13+00:00","og_image":[{"width":748,"height":493,"url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg","type":"image\/jpeg"}],"author":"Yeeply","twitter_card":"summary_large_image","twitter_creator":"@Yeeply_EN","twitter_site":"@Yeeply_EN","twitter_misc":{"Written by":"Yeeply","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#article","isPartOf":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/"},"author":{"name":"Yeeply","@id":"https:\/\/yeeply.com\/en\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14"},"headline":"Web Security: how to secure your database and web servers","datePublished":"2017-05-23T09:04:13+00:00","dateModified":"2023-12-11T08:47:13+00:00","mainEntityOfPage":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/"},"wordCount":1061,"publisher":{"@id":"https:\/\/yeeply.com\/en\/#organization"},"image":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg","articleSection":["Web"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/","url":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/","name":"Web Security: Securing Your Database and Web Servers","isPartOf":{"@id":"https:\/\/yeeply.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#primaryimage"},"image":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg","datePublished":"2017-05-23T09:04:13+00:00","dateModified":"2023-12-11T08:47:13+00:00","description":"The most crucial issues to any business with an online presence is web security. We show you why securing Your Database and Web Servers is essential.","breadcrumb":{"@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#primaryimage","url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg","contentUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg","width":748,"height":493,"caption":"graphic lock"},{"@type":"BreadcrumbList","@id":"https:\/\/yeeply.com\/en\/blog\/web-development\/database-security-and-how-to-secure-your-web-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yeeply.com\/en\/"},{"@type":"ListItem","position":2,"name":"Web Security: how to secure your database and web servers"}]},{"@type":"WebSite","@id":"https:\/\/yeeply.com\/en\/#website","url":"https:\/\/yeeply.com\/en\/","name":"Yeeply","description":"A platform for the development of digital projects","publisher":{"@id":"https:\/\/yeeply.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yeeply.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yeeply.com\/en\/#organization","name":"Yeeply","url":"https:\/\/yeeply.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yeeply.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","contentUrl":"https:\/\/yeeply.com\/en\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","width":360,"height":120,"caption":"Yeeply"},"image":{"@id":"https:\/\/yeeply.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YeeplyMobile\/","https:\/\/x.com\/Yeeply_EN","https:\/\/www.linkedin.com\/company\/yeeply"]},{"@type":"Person","@id":"https:\/\/yeeply.com\/en\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14","name":"Yeeply","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","caption":"Yeeply"},"url":"https:\/\/yeeply.com\/en\/author\/yeeply\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",748,493,false],"thumbnail":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock-150x150.jpg",150,150,true],"medium":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock-300x198.jpg",300,198,true],"medium_large":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",640,422,false],"large":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",640,422,false],"1536x1536":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",748,493,false],"2048x2048":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",748,493,false],"gform-image-choice-sm":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",300,198,false],"gform-image-choice-md":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",400,264,false],"gform-image-choice-lg":["https:\/\/yeeply.com\/en\/wp-content\/uploads\/2017\/05\/web_security_online_lock.jpg",600,395,false]},"uagb_author_info":{"display_name":"Yeeply","author_link":"https:\/\/yeeply.com\/en\/author\/yeeply\/"},"uagb_comment_info":0,"uagb_excerpt":"Numerous incidents of hacking attacks have demonstrated that among the most crucial issues to any business with an online presence is web server security. Web ...","_links":{"self":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts\/3790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/comments?post=3790"}],"version-history":[{"count":1,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts\/3790\/revisions"}],"predecessor-version":[{"id":14649,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/posts\/3790\/revisions\/14649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/media\/8038"}],"wp:attachment":[{"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/media?parent=3790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/categories?post=3790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yeeply.com\/en\/wp-json\/wp\/v2\/tags?post=3790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}