Best In Class Data Center
Our Cloud Servers are hosted in the Level 3 facility in the Telehouse data center in NYC.
One of America’s International Internet Exchanges is located here.
This provides our customers with better network-to-network connectivity.
Data Center Features
- Windowless Security Hardened Facility
- N+1 electrical design and distribution
- Redundant UPS and Battery Backup
- Can run up to 30 days without any external power
- Active Fire Prevention and Suppression
- Humidity and zone temperature control
- Multiple True Diverse Fiber Entrances
- Zone 2 Seismic Code Construction
- On-Site Security and Support Personnel
- 24 x 7 Monitoring and Operational Support
The goal of a hacker is to gain unauthorized access to your WordPress site. They use a number of different methods to do this, we have listed the most common below.
Brute Force Attacks
WordPress brute force attacks refer to the trial and error method of entering multiple user-name and password combinations over and over until a successful combination is discovered. The brute force attack method exploits the simplest way to gain access to your website, through the login screen.
WordPress, by default, doesn’t limit login attempts, so bots can attack your WordPress login page using the brute force method without restriction if left unchanged.
File Inclusion Exploits
This is where vulnerabilities in your website’s PHP code are exploited by attackers. (PHP is the code that runs your WordPress website)
File inclusion exploits occur when vulnerable PHP code is used to load remote files that allow attackers to gain access to your website. File inclusion exploits are one of the most common ways an attacker can gain access to your website’s wp-config.php file, one of the most important files in your WordPress installation.
SQL injections occur when an attacker gains access to your WordPress database and to all of your website data.
With an SQL injection, an attacker may be able to create a new admin-level user account which can then be used to login and get full access to your WordPress website. SQL injections can also be used to insert new data into your database, including links to malicious websites.
Cross-Site Scripting (XSS)
84% of all security vulnerabilities on the Internet are the result of Cross-Site Scripting or XSS attacks. Cross-Site Scripting vulnerabilities are the most common vulnerability found in WordPress plugins.
Malware is code that is used to gain unauthorized access to a website to gather sensitive data. A hacked WordPress site usually means malware has been injected into your website’s files, so if you suspect malware on your site, take a look at recently changed files.
Malware can be cleaned, either by manually removing the malicious files, installing a fresh version of WordPress or by restoring your WordPress site from a previous, non-infected backup.
Did you know over 30,000 WordPress blogs are hacked each day?
If you’re running a word press site and have done nothing about security, either your site has already been hacked or it likely will be. Today most WordPress hacks are done by bots which gather information from spiders crawling your site. They look for specific information so they know how to exploit your site. Here are 5 steps you should take on any blog you set up.
- Make sure your WordPress software is up to date (the most current version).
- Make sure all your plugins are up to date and remove any plugins or themes you’re not using.
- Install a good firewall plugin. There are a number of free plugins available in the Add Plugin search in the WP Admin section. (Popular Plugins: Bulletproof, Wordfence, Ninja Firewall)
- Make sure your backing up your WordPress database regularly, there are plugins to automate this task.
- Install a Core Scanner like Look-see available in the plugin add search which can tell you if any of your core WordPress files have been changed.
These simple steps can dramatically improve your website’s security, if you don’t feel you can perform these steps but realise the importance we do offer a WP security package to help you secure your blog which includes the installation of the plugins.
Protect yourself from viruses, malware, and spam from coming into your email inbox.
Most viruses, Trojan horses, and worms are activated when you open an attachment or clicking a link in an email message. If your email client allows scripting, then it is also possible to get a virus by just opening a message. It’s best to limit what HTML is available in your email messages and protect yourself with a good front end antivirus filter so harmful content never reaches your inbox.
The Inbox Sentry Virus Scanning Engine provides around the clock virus protection with up to the minute defense against the latest Virus and Worm threats. The system identifies and blocks viruses, worms and other and potentially dangerous email attachment types before they are able to reach your mail server or email users.
All email messages are checked against a database of over 200,000 Virus Definitions. If a virus or other dangerous attachment is detected the Inbox Sentry system will immediately block the message from delivery and send it to the system quarantine. The Inbox Sentry system automatically receives updates of Spam Filter Rules and Virus Definitions several times per hour providing up to the minute defense against the latest Virus and Worm threats ensuring effective and accurate Spam and Virus Protection. While other systems have spam detection rates of 40 to 70 percent, the Inbox Sentry system is able to provide high Spam/Virus detection rates of up to 98% or more with very low false positive rates using only the default settings.
These detection rates can be further improved by the automatic self-tuning and learning mechanisms built into the Inbox Sentry system as well as by adjustments made to the Spam Scanning and Filtering engine.
InboxSentry is a stand-alone service that will work with any email provider.