Every day across the internet, hackers, malicious users, and cybercriminals, for whatever motive they may have, compromise thousands of websites. Their hacks are even sometimes invisible to users, but can remain harmful to visitors viewing the page, including the site owner. Unbeknownst to webmasters for some amount of time, their site has become infected with various forms of harmful code; some have shown able to record keystrokes on visitor’s computers, and even steal login credentials for financial account or online banking. You may ask: Is it my web host’s responsibility to protect my website? The answer is: both yes & no. Your web host, like 4GoodHosting, has implemented strong network security mechanisms and various other security measures to ensure your website works optimally. However, keeping each website secure is also the responsibility of the webmaster. Shared hosting is also by nature an “unmanaged” environment. This implies that each customer is responsible for updating their applications, website code and implementing security precautions to protect their website files and CMS (Content Management Service - such as Wordpress/Drupal/Joomla). Over the years we have seen various and some recent vulnerabilities with popular applications such as WordPress. Sometimes these breaches through Wordpress have impacted customer websites; because the site owners’ did not keep their applications up to date - even after receiving notifications that their installation needs to be patched due to vulnerabilities that have been identified. Some examples of these attacks are: SQL injections, Code injections, template holes and many more. If your site gets hacked what should you do? Here is where you should ask yourself: “Do I want to handle it myself? Or get help?” Here at 4GoodHosting we follow a well thought out and rigid methodology that enables us to automatically scan for and identify malware/hacks on our customers’ sites. We have built a rigorous process to resolve and fix the attack, “hack” as soon as possible. We employ the following steps: 1) 24/7 Monitoring 2) Scanning of the site 3) Assessing the damage (hacked with spam or malware) 4) Identify the vulnerability 5) If necessary, Quarantining the site 6) Validating backup files 7) Clean and maintain the website read_more However,...
On This Page