4 Ways to Make your Website a Target for Intrusion
Wednesday, September 10th, 2014Tavis J. Hampton  
ARTICLE Web hosting security can be complex and time consuming. There are so many creative ways for people with nefarious intent to do harm to your website, and you might spend a good amount of time trying to make sure they...

cyber criminalsencryptionpasswordpermissionssecurity

Interview: Shay Rapaport of Fireblade
Sunday, August 31st, 2014THN News  
ARTICLE Video Interview with Shay Rapaport of Fireblade. Ben:  Hi, how are you doing? This is Ben Fisher. I’m with The Hosting News and we’re here at HostingCon 2014. We’re here with Shay Rapaport with Fireblade. Fireblade is where you...

Interview: Sam Renkema SpamExperts
Saturday, August 30th, 2014THN News  
ARTICLE Video interview with Sam Renkema of SpamExperts. Ben:  Hi. How are you doing? This is Ben Fisher. I’m with We have today with us a very special guest. This is Sam Renkema from SpamExperts. They are a spam and...

5 Web Application Security Tips
Friday, August 29th, 2014Tavis J. Hampton  
ARTICLE Most websites run some type of web applications that depend on server-side scripting. While this type of scripting adds a tremendous amount of functionality, it also presents a number of security issues. What follows are five web application security tips...

application firewalldevelopersopen sourcepermissionssecurity

Hosting Security Standards and Regulations Compliance
Wednesday, August 6th, 2014Tavis J. Hampton  
ARTICLE Hosting security is not just about making sure your website, server, data center and infrastructure are safe. It also involves ensuring your web host’s security measures comply with your organization’s standards, industry standards and government regulations. For many businesses, security...

complianceinternationalISO 27001PCIPCI-DSS

Password Managers Can Help Prevent Cybercrime
Saturday, July 26th, 2014Tavis J. Hampton  
ARTICLE They might be reading your emails, studying your shopping habits, or even using your computer as a spam machine to send male enhancement offers to unsuspecting third parties, and these are the mild scenarios. Cybercriminals can do serious damage to...


Use Password Aging to Enforce VPS Security
Friday, July 18th, 2014Tavis J. Hampton  
ARTICLE If you are moving from shared hosting to a VPS, one thing you might not be accustomed to dealing with is having shell access to your account. You can use SSH to directly manipulate your Linux or Unix virtual private...

chagechangecommand linepasswordssh

Are Backups and Recovery a Part of Security?
Friday, June 20th, 2014Tavis J. Hampton  
ARTICLE There is little doubt that backups and recovery are vital parts of a healthy web hosting experience. But are backups and recovery part of security? If you do not have good backups, is the security of your website, server or...

backupsblockingfile systemshosting securitypasswords

Understanding Web Server File Permissions
Tuesday, May 27th, 2014Tavis J. Hampton  
ARTICLE If you are new to web hosting, one topic that may be a bit of a challenge for you is web server file permissions. Anything you upload to your site will have a set of permissions associated with it. In...


Basic .htaccess Security Tips
Thursday, March 13th, 2014Tavis J. Hampton  
ARTICLE If you web host runs Apache HTTP server to host your website, it might also allow users like you to utilize .htaccess files. If you are not sure if your host does allow them, you should check the host’s documentation...

AllowOverrideapachechmodconfiguration filehtaccess