How to spot a secure service (aka, Why Expensify uses HTTPS for everything)

David Barrett —  October 25, 2010 — 3 Comments

I just read this article about how someone made a Firefox extension to steal sessions from popular websites. Are you kidding me? Security isn’t an easy thing, I’ll admit. And maybe we take security to the extreme. But seriously, it’s amazing how many other sites don’t even do the basics. When choosing any service that involves sensitive information, especially sensitive financial information, I’d suggest always looking for the following:

  • Make sure the address starts with https://. (Sometimes this is replaced with an icon of a little padlock.) This means it’s using the “secure” version of HTTP, which is the protocol that powers the web. Make sure it’s there from they very first page you load, and stays there as you browse the site. Sure, it’s a bit more expensive for the company. But it’s the least we can do.**
  • Look for PCI compliance. Or, if not that (because it’s pretty intense), at least *some* indication they’re using a third-party approved security framework.
  • Look for strong partnerships, such as banks and financial institutions. These guys take security really seriously, so if they’re on board, it’s another vote in the site’s favor.

Real security often isn’t easy. But most important things aren’t.

-david

** Note: I should highlight that this blog doesn’t use HTTPS, but it’s also not asking you for anything. When you sign in to Expensify proper — at https://expensify.com — every connection is secure.

David Barrett

Posts

Founder of Expensify, destroyer of expense reports, and savior to frustrated employees worldwide.

3 responses to How to spot a secure service (aka, Why Expensify uses HTTPS for everything)

  1. 

    What kind of sensitive information do you keep at Expensify? As I understand, there is no credit card information, e.g. PAN, Expiration data, and Name.

    Do you encrypt all the data or only username and password to access credit card reports?

    And you have mentioned about 2 separate keys.
    If one of you died (god forbids), wouldn’t you have a problem decrypting the information on the server?

  2. 

    @tnn – We use different types of encryption for different types of information so it tends to get complicated. But for the 2 separate keys, we do have a system to deal with the scenario where one of the key custodians is unavailable: we call it “breaking the glass” because it is a big pain and leaves a huge paper trail. But that’s why we keep a lot of servers on hand such that we’re never in a situation that absolutely requires both keys *right now* — we have the luxury of waiting until both keys are available.

Trackbacks and Pingbacks:

  1. CEO Friday: HTTPS Twitter, FourSquare, OMG about time. « Expensify Blog - April 8, 2011

    […] fix to a glaring security hole.  It’s an embarrassment.  We’ve been doing this from the very first day, even before it was cool.  Scratch that — it was never cool, it was just obvious.  It makes […]

Have something to say? Share your thoughts with us!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s