Maintaining a secure web site is very important. These articles provide information about how to secure your web site, how to reduce spam, what to do if your web site’s security is compromised, and more.
-
SSL
SSL (Secure Sockets Layer) helps enhance your site’s security. This collection of articles covers how to install and renew SSL certificates, redirect users to secure connections, and more.
-
Perpetual Security
Hosting security is important, and the A2 Hosting Perpetual Security initiative contains several features that help protect your web site from malicious actors. This collection of articles covers KernelCare and HackScan.
-
Securing an unmanaged server
On unmanaged hosting packages, you are responsible for server administration. One of the most important things to do is secure your server, and this article covers the best way to secure your unmanaged server by using strong passwords, disabling root SSH access, updating the server regularly, setting up a firewall, and setting up fail2ban.
-
Securing a hacked site
If your web site gets hacked despite your best efforts, this guide is here to help you secure your site and help prevent future attacks. This article covers topics such as how to determine the cause of a hack, and how to clean up after a hack.
-
Managing unwanted e-mail (spam)
Unwanted e-mail (spam) can be a major hassle, as well as a potential security risk. This collection of articles covers topics such as managing spam in cPanel, and preventing outgoing mail from being marked as spam.
-
Application security
These articles discuss security-related issues for specific applications, such as WordPress.
-
Choosing a strong password
Using a strong password is vital for your account’s security. This article offers some techniques and advice on how to create a strong password, as well as how to safeguard your password.
-
Installing updates on your server
For unmanaged products, one of the most important things you can do to maintain a more secure server is to regularly apply updates. This article describes how to install updates on the CentOS, Fedora, Debian, and Ubuntu distributions.
-
Hardening a server with fail2ban
For unmanaged products, the fail2ban program can greatly simplify the task of defending against scripted attacks and botnets. Learn how to install and configure fail2ban in this article.
-
Fixing the Heartbleed vulnerability on unmanaged servers
Read this article for all you need to know about how the “Heartbleed” vulnerability affects your server, and how to fix it. Please note that this article only applies to certain unmanaged products.
-
Understanding software vulnerabilities and protecting your account
Learn about software vulnerabilities in web applications, and how you can help keep your account secure. This article covers what a vulnerability is, why they exist, what you can do to protect your account, and what A2 Hosting does to protect your account.
-
Email phishing scam attempts
Email phishing attempts aim to glean your identifying information for nefarious purposes such as identity theft. It’s best to stay informed and keep a few tricks in mind to prevent yourself from becoming the victim of a phishing attack. This article covers the best methods to protect yourself and your account at A2 Hosting.
-
Generating Google reCAPTCHA keys for site security
This article guides you through the process of generating reCAPTCHA (site and secret) keys from Google. By adding reCAPTCHA capability, you can help improve your site’s security.