sourcedefense.com Open in urlscan Pro
35.185.203.155  Public Scan

Submitted URL: https://ckgv304.na1.hubspotlinks.com/Ctc/RH+113/cKGv304/VW-BvT7xD7s5W9bqbj62kyc4lW6D6W6y4PqT0FN8Vtb6N5nKvpV3Zsc37CgD5BW5_5Rd472c7cpV4...
Effective URL: https://sourcedefense.com/resources/blog/ecommerce-digital-and-marketing-teams-in-the-security-and-privacy-crosshairs/?utm...
Submission: On September 01 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6087099/1e7d0bca-6d3b-46b2-8a2e-b276f201fad6

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6087099/1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" enctype="multipart/form-data" id="hsForm_1e7d0bca-6d3b-46b2-8a2e-b276f201fad6"
  method="POST" class="hs-form stacked hs-form-private hsForm_1e7d0bca-6d3b-46b2-8a2e-b276f201fad6 hs-form-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6 hs-form-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6_b67b4662-ae4c-4167-935f-2740eb592c7a"
  data-form-id="1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" data-portal-id="6087099" target="target_iframe_1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" data-reactid=".hbspt-forms-0" data-hs-cf-bound="true">
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-0.1:$0">
    <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$firstname"><label id="label-firstname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="" placeholder="Enter your First name"
        for="firstname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$firstname.0.0">First name</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname"><input id="firstname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="hs-input" type="text" name="firstname" value="" placeholder="" autocomplete="given-name"
          data-reactid=".hbspt-forms-0.1:$0.1:$firstname.$firstname.0" inputmode="text"></div>
    </div>
    <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0.1:$lastname"><label id="label-lastname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="" placeholder="Enter your Last name"
        for="lastname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0"><span data-reactid=".hbspt-forms-0.1:$0.1:$lastname.0.0">Last name</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname"><input id="lastname-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="hs-input" type="text" name="lastname" value="" placeholder="" autocomplete="family-name"
          data-reactid=".hbspt-forms-0.1:$0.1:$lastname.$lastname.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1" data-reactid=".hbspt-forms-0.1:$1">
    <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$1.1:$email"><label id="label-email-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="" placeholder="Enter your Email"
        for="email-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" data-reactid=".hbspt-forms-0.1:$1.1:$email.0"><span data-reactid=".hbspt-forms-0.1:$1.1:$email.0.0">Email</span><span class="hs-form-required"
          data-reactid=".hbspt-forms-0.1:$1.1:$email.0.1">*</span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1:$email.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-0.1:$1.1:$email.$email"><input id="email-1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" class="hs-input" type="email" name="email" required="" placeholder="" value="" autocomplete="email"
          data-reactid=".hbspt-forms-0.1:$1.1:$email.$email.0" inputmode="email"></div>
    </div>
  </fieldset><noscript data-reactid=".hbspt-forms-0.2"></noscript>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Subscribe" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:1815.1000022888184,&quot;rumServiceResponseTime&quot;:2237.2999992370605,&quot;rumFormRenderTime&quot;:1.5,&quot;rumTotalRenderTime&quot;:2359.6000022888184,&quot;rumTotalRequestTime&quot;:403.5999984741211,&quot;lang&quot;:&quot;en&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;embedAtTimestamp&quot;:&quot;1662047722237&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1636402844863&quot;,&quot;pageUrl&quot;:&quot;https://sourcedefense.com/resources/blog/ecommerce-digital-and-marketing-teams-in-the-security-and-privacy-crosshairs/?utm_campaign=Digital_Q3%2FQ4-FY%2022&amp;utm_medium=email&amp;_hsmi=224610025&amp;_hsenc=p2ANqtz-8tIC1loZBysxTgCKlRoKYLR-N2MF9rB-t5w-2x9cDsr3JrmFvr0SEErFpMGh5lQTjFWucISa903kdOkLPkg_MmbvDJOA&amp;utm_content=224610025&amp;utm_source=hs_email&quot;,&quot;pageTitle&quot;:&quot;Ecommerce, Digital and Marketing Teams in the Security and Privacy Crosshairs - Source Defense&quot;,&quot;source&quot;:&quot;FormsNext-static-5.519&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.519&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;519&quot;,&quot;timestamp&quot;:1662047722237,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;6087099&quot;,&quot;formId&quot;:&quot;1e7d0bca-6d3b-46b2-8a2e-b276f201fad6&quot;,&quot;target&quot;:&quot;#hbspt-form-1662047721903-3676800348&quot;},&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;Digital_Q3/Q4-FY 22&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;224610025&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-8tIC1loZBysxTgCKlRoKYLR-N2MF9rB-t5w-2x9cDsr3JrmFvr0SEErFpMGh5lQTjFWucISa903kdOkLPkg_MmbvDJOA&quot;,&quot;utm_content&quot;:&quot;224610025&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;],&quot;formTarget&quot;:&quot;#hbspt-form-1662047721903-3676800348&quot;,&quot;correlationId&quot;:&quot;66282f10-e8dc-4b1b-ba31-fa3330b06d96&quot;,&quot;hutk&quot;:&quot;44ac1110e493caebf96db054db29fbe3&quot;,&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_1e7d0bca-6d3b-46b2-8a2e-b276f201fad6" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

Text Content

Skip to content
 * Products
   * Platform
   * ADMIN
   * VICE
   * WiPP
   * Website Threat Report
 * Industries
   * Financial Institutions
   * Online Retailers
   * Healthcare
   * Travel, Ticketing & Aviation
   * Media & Content Publishers
 * Resources
   * Blog
   * White Papers
   * Webinars
   * Research Lab
   * Video
   * FAQ


 * Events
   * Field Events
 * Company
   * About Us
   * Leadership
   * Board & Investors
   * Partners
   * Press & News
   * Join Our Team
   * Contact Us
 * Request a Demo


ECOMMERCE, DIGITAL AND MARKETING TEAMS IN THE SECURITY AND PRIVACY CROSSHAIRS




By Source Defense

If you’re in the Retail sector, you’ve experienced an ecommerce surge over the
past two years that was once predicted to take a decade. That means great
opportunity but also great risk. If you’re a Digital or Marketing professional
not in Retail, you understand that when it comes to doing business or promoting
your business online, every company is a digital media and content publisher.
Regardless of industry, you and your web team are constantly looking for new
tools and partners to enhance user experience, collect visitor analytics, engage
prospects and customers through chatbots or advertising, automate information
request forms, and process credit cards, among many other functions.

While all of this innovation is helping to drive brand awareness and revenue,
there’s a dark side that, as a digital media professional, you must consider
before you deploy that next 3rd party web application. Every day, your partner
ecosystem puts you at risk of both data leakage – which occurs when your
partners overreach, and the risk of data theft – which is perpetrated by
cybercriminals. Both scenarios open you up for data privacy noncompliance fines
and the potential for millions in losses. It only takes one 3rd party partner
collecting data it shouldn’t, or one compromised rogue script to enable
cybercriminals to steal the personal and financial data of your web visitors,
putting your department in the crosshairs of a crisis that could have massive
legal and financial implications.

This is why your Security and Governance, Risk and Compliance (GRC) teams are
always so paranoid about what you’re doing – and why many organizations find it
hard to implement new functionality on their websites without lengthy review
with those teams. But knowing what the risk is, and understanding that there are
solutions to mitigate this risk which are easy to implement, cost effective, and
don’t add burden to the Security or GRC teams is the way that YOU get back in
the driver’s seat of what happens on your website.   


THE THREATS YOU MUST PROTECT AGAINST

While every modern user-centered, feature-rich website is different, client-side
processes are almost always written in JavaScript. According to our team’s
latest intelligence, there are more than 1.7 billion public-facing websites
worldwide, and JavaScript is used on 95% of them.

Your partners employ JavaScript to enable the functionality you’re after – but
you have virtually no visibility into what this code is doing. In a best case
scenario, your partners may be capturing data in violation of strict data
privacy compliance policies such as GDPR. In the worst case scenario, their code
may be compromised by criminals to steal millions of credit cards, identities,
etc. That’s why the latest PCI Security Council standard calls for doing
something about the use of JavaScript across commerce oriented pages.

When understanding the risk of attack, it is important that you – as the
business owner – know what you’re up against. Every client-side web attack is
different, but they all focus on data theft at the point of input – your forms.
By attacking the point of input, cybercriminals can steal the customer’s private
information, including credit card information, in real-time.

A data breach is a quick way to convince customers to go elsewhere, where their
personal information or other sensitive data will be secure. Surveys reveal that
64% of consumers confess to being unlikely to do business again with a company
from which their personal data was stolen. So what are some of the ways
cybercriminals are doing it?


FORMJACKING

These attacks can affect millions of people at once, or they can be highly
targeted and affect a very specific group of people. Formjacking occurs when
online criminals hack into a website to control its entry point where sensitive
information is provided. This type of hack is most commonly associated with
cybercriminals who seek to steal personal information such as phone numbers and
home addresses, which could lead to identity theft.


PAYMENT CARD SKIMMING (E-SKIMMING, DIGITAL SKIMMING)

While retailers and banks have experienced physical skimming, where the
attackers install stealthy credit card skimmer devices on ATM machines or
point-of-sale terminals to steal credit card or debit card numbers and PINs,
today’s cybercriminals do the same thing on e-commerce websites and skim payment
data from input fields on existing payment forms or hijack unsuspecting users to
fake checkout pages.


MAGECART 

Magecart is a type of digital skimming attack that steals information from
customers’ payment cards. They target shopping carts from systems like Magento,
where a third-party piece of code, compromised by a systems integrator, can be
infected without IT departments knowing about it. This is also known as a supply
chain attack.


FORM FIELD MANIPULATION

Hackers can manipulate form fields to alter the data sent to a web server. They
learn about your form field data by studying the source code on your web page.
Anyone can do this by right-clicking on a page and choosing “view source code.”
The HTML code includes your form field data, which skilled hackers can
manipulate using injection attacks and other techniques.


DEFEND YOUR DIGITAL ENTERPRISE

Digital and marketing teams take note: It is time to deploy a control system to
identify and control all 3rd party JavaScript on your web pages. And you can do
so without adding complexity to your environment or requiring major capital
expenditures.

Source Defense uses real-time JavaScript sandboxing technology to create virtual
pages that isolate the 3rd party scripts from the website. The virtual pages are
an exact replica of the original ones, excluding what the 3rd parties are not
supposed to see. We monitor all 3rd party script activities on the virtual
pages. If the activity is within the premise of what they are allowed to do, we
will transfer it from the virtual page to the original one. If not, we will keep
their activity on the virtual pages isolated from the user and send a report to
the website owner, alerting them of the 3rd party scripts violating their
security policy. 

This is as close to ‘set it and forget it’ security and data privacy that you
will see on the market. And it is a solution that gets Security and GRC out of
the way of your decision making. Best of all, you can secure your customers’
data for a price similar to the third-party tools causing your security
nightmares.

Request a Demo to learn more about how Source Defense can help you mitigate a
material risk to your organization, keep your partners from overreaching and
defend your enterprise from Client-Side Attacks.

Source Defense is a mission-critical element of web security. It is a data
privacy compliance and security solution that protects sensitive user data
collected on websites from data leakage or theft by extending security to the
client-side. Source Defense is the market leader in Client-side Security for
websites, providing real-time threat detection, protection, and prevention of
vulnerabilities originating in JavaScript. Source Defense’s patented Website
Client-side Security Platform offers the most comprehensive & complete solution
addressing threats and risks from the increased usage of JavaScript, libraries,
and open source in websites today.


RELATED POSTS:

[Infographic] Magecart by The Numbers
[New Threat] JS Skimmer ‘Pipka’ Attacks eCommerce Businesses
3 Months after Ticketmaster attach, breached tools still in use on over 1000
websites


PCI DSS 4.0 MAKES CLIENT-SIDE SECURITY A PRIORITY.

Source Defense delivers a solution for 6.4.3 and 11.6.1 without adding a burden
to your security teams.

Download the Guide


SOLUTIONS

 * Platform
 * ADMIN
 * VICE
 * WiPP
 * Website Threat Report


INDUSTRIES

 * Financial Institutions
 * Online Retailers
 * Healthcare
 * Travel, Ticketing & Aviation
 * Media & Content Publishers


RESOURCES

 * Blog
 * White Papers
 * Webinars
 * Video
 * Research Lab
 * FAQ


COMPANY

 * About Us
 * Leadership
 * Board & Investors
 * Partners
 * Press & News
 * Join Our Team
 * Contact Us

KEEP YOUR WEBSITE SAFE

Get the latest news and updates to bulletproof your website

First name

Last name

Email*


Request a Demo
 * linkedin
 * Facebook
 * Twitter

Privacy Policy | Terms of Service | ©2022 Source Defense. All Rights Reserved.
Scroll

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in
settings.

Accept Reject
Close GDPR Cookie Settings
 * Privacy Overview
 * Strictly Necessary Cookies

Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user
experience possible. Cookie information is stored in your browser and performs
functions such as recognising you when you return to our website and helping our
team to understand which sections of the website you find most interesting and
useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save
your preferences for cookie settings.

Enable or Disable Cookies

If you disable this cookie, we will not be able to save your preferences. This
means that every time you visit this website you will need to enable or disable
cookies again.

Enable All Save Settings