Security



Interview: Shay Rapaport of Fireblade
Sunday, August 31st, 2014THN News  
ARTICLE http://www.youtube.com/watch?v=ztlxB-rRztE&feature=youtu.be Video Interview with Shay Rapaport of Fireblade. Ben:  Hi, how are you doing? This is Ben Fisher. I’m with The Hosting News and we’re here at HostingCon 2014. We’re here with Shay Rapaport with Fireblade. Fireblade is where you...







Interview: Sam Renkema SpamExperts
Saturday, August 30th, 2014THN News  
ARTICLE Video interview with Sam Renkema of SpamExperts. Ben:  Hi. How are you doing? This is Ben Fisher. I’m with www.thehostingnews.com. We have today with us a very special guest. This is Sam Renkema from SpamExperts. They are a spam and...







5 Web Application Security Tips
Friday, August 29th, 2014Tavis J. Hampton  
ARTICLE Most websites run some type of web applications that depend on server-side scripting. While this type of scripting adds a tremendous amount of functionality, it also presents a number of security issues. What follows are five web application security tips...

application firewalldevelopersopen sourcepermissionssecurity





Hosting Security Standards and Regulations Compliance
Wednesday, August 6th, 2014Tavis J. Hampton  
ARTICLE Hosting security is not just about making sure your website, server, data center and infrastructure are safe. It also involves ensuring your web host’s security measures comply with your organization’s standards, industry standards and government regulations. For many businesses, security...

complianceinternationalISO 27001PCIPCI-DSS





Password Managers Can Help Prevent Cybercrime
Saturday, July 26th, 2014Tavis J. Hampton  
ARTICLE They might be reading your emails, studying your shopping habits, or even using your computer as a spam machine to send male enhancement offers to unsuspecting third parties, and these are the mild scenarios. Cybercriminals can do serious damage to...

cloudcriminalscybercrimeencryptedpassword





Use Password Aging to Enforce VPS Security
Friday, July 18th, 2014Tavis J. Hampton  
ARTICLE If you are moving from shared hosting to a VPS, one thing you might not be accustomed to dealing with is having shell access to your account. You can use SSH to directly manipulate your Linux or Unix virtual private...

chagechangecommand linepasswordssh





Are Backups and Recovery a Part of Security?
Friday, June 20th, 2014Tavis J. Hampton  
ARTICLE There is little doubt that backups and recovery are vital parts of a healthy web hosting experience. But are backups and recovery part of security? If you do not have good backups, is the security of your website, server or...

backupsblockingfile systemshosting securitypasswords





Understanding Web Server File Permissions
Tuesday, May 27th, 2014Tavis J. Hampton  
ARTICLE If you are new to web hosting, one topic that may be a bit of a challenge for you is web server file permissions. Anything you upload to your site will have a set of permissions associated with it. In...

apacheexecutefilegrouplinux





Basic .htaccess Security Tips
Thursday, March 13th, 2014Tavis J. Hampton  
ARTICLE If you web host runs Apache HTTP server to host your website, it might also allow users like you to utilize .htaccess files. If you are not sure if your host does allow them, you should check the host’s documentation...

AllowOverrideapachechmodconfiguration filehtaccess





Unified Threat Management for Comprehensive Hosting Security
Monday, March 3rd, 2014Tavis J. Hampton  
ARTICLE Many managed hosting solutions now offer something called unified threat management (UTM). Rather than having separate solutions for firewall, anti-virus, intrusion detection, etc., all of it is rolled into one unified solution. All of it is managed through a single...

anti-spamanti-viruscontent filteringconverged infrstructurefirewall