Category Archives: Security

9 Ways to Keep Your WordPress Website Secure
Over 28 million live websites now use WordPress. While it’s great to be part of such a large and active community, this popularity makes the platform a prime target for malicious hackers....
Continue reading
Coming Soon: FREE Enhanced Account Protection With ModSecurity!
Our team has been hard at work to deliver enhanced account protection using ModSecurity. In the coming weeks, FREE ModSecurity protection will automatically be rolled out on our Shared Hosting and Reseller Hosting accounts. There’s...
Continue reading
What is CloudLinux and How Does It Help Shared Hosting?
What is CloudLinux? CloudLinux is a linux based operating system designed to give shared hosting providers a more stable and secure OS. Essentially a set of kernel modifications to the...
Continue reading
The 5 Most Common WordPress Attacks (And How to Prevent Them)
Cybersecurity is a perennial hot topic, more so today than ever before. As a WordPress site owner, it is highly important to go big on security and do your best to protect...
Continue reading
A Security Checklist for Web Developers (5 Points)
No matter how strong your development skills are, having a web security checklist is crucial. It’s common for web professionals to pay more attention to design, functionality, and other immediate...
Continue reading
Are Your Online Passwords Strong Enough for 2020?
Whenever you don’t use a strong password, you run the risk of losing vital and often personal information. At best, a compromised password can lead to being briefly locked out...
Continue reading
How To Choose Which SSL Certificate To Use For Your Site
Adding a Secure Sockets Layer (SSL) certificate to your website is a cybersecurity best practice. However, it can be hard to know if a free one is enough for your...
Continue reading
3 Methods to Protect Your Site from Malicious Intent
Protecting your platform against hackers is a complex but necessary task for running a successful website. There are many factors that influence cybersecurity, and overlooking any one of them may...
Continue reading