Code security
Security by obscurity
SSH on any port other than 22.
SQL Injection
-
Avoid RAW SQL in the application codebase.
-
Avoid SQL with custom parameterization outside of ORM.
-
Avoid hidden fields in forms. Let the server query again if required. These generally tend to skip security checks
-
Submit HTTP forms with CSRF.
-
Use ReCaptcha to avoid API spamming of the backend for the frontend.
User Information
The security of users’ information is one of the biggest assets for many companies. Act accordingly.