What Can Shared Hosting and VPS Users Do About Shellshock?
Monday, September 29th, 2014  
ARTICLE If you follow tech news at all, you have by now probably heard about the “Shellshock” vulnerability affecting Bash across all Linux, BSD, and Unix variants that use the shell program. For dedicated server users, the solution is quite simple,...

Bash bsd linux server shared hosting

4 Ways to Make your Website a Target for Intrusion
Wednesday, September 10th, 2014  
ARTICLE Web hosting security can be complex and time consuming. There are so many creative ways for people with nefarious intent to do harm to your website, and you might spend a good amount of time trying to make sure they...

cyber criminals encryption password permissions security

Interview: Shay Rapaport of Fireblade
Sunday, August 31st, 2014  
ARTICLE Video Interview with Shay Rapaport of Fireblade. Ben:  Hi, how are you doing? This is Ben Fisher. I’m with The Hosting News and we’re here at HostingCon 2014. We’re here with Shay Rapaport with Fireblade. Fireblade is where you...

Interview: Sam Renkema SpamExperts
Saturday, August 30th, 2014  
ARTICLE Video interview with Sam Renkema of SpamExperts. Ben:  Hi. How are you doing? This is Ben Fisher. I’m with We have today with us a very special guest. This is Sam Renkema from SpamExperts. They are a spam and...

5 Web Application Security Tips
Friday, August 29th, 2014  
ARTICLE Most websites run some type of web applications that depend on server-side scripting. While this type of scripting adds a tremendous amount of functionality, it also presents a number of security issues. What follows are five web application security tips...

application firewall developers open source permissions security

Hosting Security Standards and Regulations Compliance
Wednesday, August 6th, 2014  
ARTICLE Hosting security is not just about making sure your website, server, data center and infrastructure are safe. It also involves ensuring your web host’s security measures comply with your organization’s standards, industry standards and government regulations. For many businesses, security...

compliance international ISO 27001 PCI PCI-DSS

Password Managers Can Help Prevent Cybercrime
Saturday, July 26th, 2014  
ARTICLE They might be reading your emails, studying your shopping habits, or even using your computer as a spam machine to send male enhancement offers to unsuspecting third parties, and these are the mild scenarios. Cybercriminals can do serious damage to...

cloud criminals cybercrime encrypted password

Use Password Aging to Enforce VPS Security
Friday, July 18th, 2014  
ARTICLE If you are moving from shared hosting to a VPS, one thing you might not be accustomed to dealing with is having shell access to your account. You can use SSH to directly manipulate your Linux or Unix virtual private...

chage change command line password ssh

Are Backups and Recovery a Part of Security?
Friday, June 20th, 2014  
ARTICLE There is little doubt that backups and recovery are vital parts of a healthy web hosting experience. But are backups and recovery part of security? If you do not have good backups, is the security of your website, server or...

backups blocking file systems hosting security passwords

Understanding Web Server File Permissions
Tuesday, May 27th, 2014  
ARTICLE If you are new to web hosting, one topic that may be a bit of a challenge for you is web server file permissions. Anything you upload to your site will have a set of permissions associated with it. In...

apache execute file group linux