The official OZON blog

HTTPS: Google’s clock is ticking

HTTPS: Google’s clock is ticking

This year, Google announced they will consider HTTPS as a metric when deciding the pagerank of a given website. However, Google has also decided to go a step further last week: they will mark HTTP websites as unsafe on 2017, and warn users about websites that are not...

Why eCommerce security is so precious?

Why eCommerce security is so precious?

As the popularity of online shopping continues to grow exponentially, security has become paramount, not only for retailers but for any business that operates through the internet, in an attempt to inspire trust and confidence in customers. Discover in this article...

How to avoid Google blacklisting?

How to avoid Google blacklisting?

Google finds thousands of new malicious websites every day. Some of these websites are created for malicious purposes, but most are legitimate business sites that have been infected without the knowledge of their owners. Are you one of them? If you are not careful...

60% of hacked SMBs are forced to go out of business

60% of hacked SMBs are forced to go out of business

Small to medium businesses are increasingly becoming targets for hackers, and it is driving many of them out of business. According to the National Cyber Security Alliance, one in five small businesses falls victim to cybercrime each year. And of those, some 60...

25% of WordPress vulnerabilities due to 3 plugins

25% of WordPress vulnerabilities due to 3 plugins

At OZON, we are huge WordPress fan because it is a very powerful, effective, and amazingly extensible platform which is why it is used by 59.6% of all websites. But there is a risk with any platform that is extensible trough the use of plugins in WordPress: that risk...

Which CMS is the most dangerous for your eCommerce site?

Which CMS is the most dangerous for your eCommerce site?

What do WordPress, Magento and Joomla all have in common? First, they are the most popular Content Management Systems (CMS) in use today. They also share another less encouraging similarity: they are among the most common hacking targets on the Internet. But which one...