4GoodHosting
Live Help
24/7 Support
4GoodHosting Canada 1 866 708 4678
Blog Menu G
Search
Categories
m
m

Category: Security

adobestock 136283864 768x511
reading time Reading Time: 7 minutes

In a follow up to last week’s blog post where we talked about how experts expect an increase in DDoS attacks this year, it makes sense for us to this week provide some tips on the best way to secure a server. Here at 4GoodHosting, in addition to being a good Canadian web hosting provider we also try to take an interest in the well being of clients of ours who are in business online. Obviously, the premise of any external threat taking them offline for an extended period of time will endanger the livelihood of their business, and as such we hope these discussions will prove valuable. Every day we’re presented with new reports of hacks and data breaches causing very unwelcome disruptions for businesses and users alike. Web servers tend to be vulnerable to security threats and need to be protected from intrusions, hacking attempts, viruses and other malicious attacks, but there’s no replacing a secure server with its role for a business that operates online and engages in network transactions. They tend to be the target because they are many times all too penetrable for hackers, and add to that the fact they’re known to contain valuable information. As a result, taking proper measures to ensure you have a secure server is as vital as securing the website, web application, and of course the network around it. Your first decisions to evaluate are the server, OS and web server you’ll choose to collectively function as server you hope will be secure, and then the kind of services that run on it. No matter which particular web server software and operating system you choose to run, you must take certain measures to increase your server security. For starters, everyone will need to review and configure every aspect of your server in order to secure it. It’s best to maintain a multi-faceted approach that offers in-depth security because each security measure implemented stacks an additional layer of defence. The following is a list we’ve assembled from many different discussion with web development and security experts that individually and collectively will help strengthen your web server security and guard against...

You may find this interesting too.
adobestock 89127696 768x536
reading time Reading Time: 5 minutes

The long and short of it is that Internet security will always be a forefront topic in this industry. That’s a reflection of both the never-ending importance of keeping data secure given the predominance of e-commerce in the world today and the fact that cyber hackers will never slow in their efforts to get ‘in’ and do harm in the interest of making ill-gotten financial gains for themselves. So with the understanding that the issue of security / attacks / preventative measures is never going to be moving to the back burner, let’s move forward to discuss what the consensus among web security experts is – namely, that DDoS Attacks are likely to occur at an even higher rate than previously for the remainder of 2017. Here at 4GoodHosting, in addition to being one of the best web hosting providers in Canada we’re very active in keeping on top of trends in the Web-based business and design worlds. as they tend to have great relevance to our customers. As such, we think this particularly piece of news is worthy of some discussion. Let’s have at it – why can we expect to see more DDoS attacks this year? Data ‘Nappers and Ransom Demands As stated, IT security professionals predict that DDoS attacks will be more numerous and more pronounced in the year ahead, and many have started preparing for attacks that could cause outages worldwide in worst-case scenarios. One such scenario could be – brace yourselves – a worldwide Internet outage. Before you become overly concerned, however, it would seem that the vast majority of security teams are already taking steps to stay ahead of these threats, with ‘business continuity’ measures increasingly in place to allow continued operation should any worst-case scenario come to fruition. Further, these same insiders say that the next DDoS attack will be financially motivated. While there are continued discussions about attackers taking aim at nation states, security professionals conversely believe that criminal extortionists are the most likely group to successfully undertake a large-scale DDoS attack against one or more specific organizations. As an example of this, look no further than the recent developments regarding Apple...

You may find this interesting too.
adobestock 138489951 768x512

If you yourself haven’t been the victim of a cyber attack, you very likely know someone else who has, and in fact the numbers suggest that upwards of 90% of organizations experienced at least SOME level of an IT security breach in the past year. Further, it’s believed that one in 6 organizations have had significant security breaches during the same period. Here at 4GoodHosting, we’ve established ourselves as a top Canadian web hosting provider but we’re always keen to explore industry trends - positive and negative - that impact what matters to our customers. And our array of customers covers pretty much any type of interest one could have in operating on the World Wide Web. Cyberattacks have pretty much become a part of every day life. While not to suggest that these types of incidents are ‘inevitable’, there is only so much any one individual or IT team can do to guard against them. Yes, there are standard PROACTIVE web security protocols to follow, but we will not look at those here given the fact that they are quite commonly understood amongst those of you who have that as part of your job detail and responsibility within the organization. Rather, let’s take a look at being REACTIVE in response to a cyber attack here, and in particular with tips on how to disinfect a data centre and beef it up against further transgressions. Anti-Virus and Firewalls - Insufficient It would seem that the overwhelming trend with cloud data security revolves around the utilization of firewalls, believing them to be a sufficiently effective perimeter. Oftentimes, however, exceptions are made to allow cloud applications to run and in thus doing so the door is opened for intrusions to occur. So much for firewalls securing the enterprise. Similarly, anti-virus software can no longer keep pace with the immense volume of daily viruses and their variants that are being created in cyberspace nearly everyday. A reputable cybersecurity firm recently announced the discovery of a new Permanent Denial-of-Service (PDos) botnet named BrickerBot, which serves to render the victim’s hardware entirely useless. A PDoS attack - or ‘phlashing’ as it’s also referred to -...

You may find this interesting too.
4gh privacyconcerns b 768x591

Skype & Snapchat, among other companies, have failed to adopt basic privacy protection as recent stated in Amnesty International’s special report “Message Privacy Ranking” report. The report compares 11 popular instant messaging services. Companies were ranked based on their recognition of online threats to human rights, default deployment of end-to-end encryption, user disclosure, government disclosure, and publishing of the technical details of their encryption. “If you think instant messaging services are private, you are in for a big surprise. The reality is that our communications are under constant threat from cybercriminals and spying by state authorities. Young people, the most prolific sharers of personal details and photos over apps like Snapchat, are especially at risk,” Sherif Elsayed-Ali, Head of Amnesty International’s Technology and Human Rights Team said in a statement. “Snapchat” only scored 26 points in the report (out of 100) and Blackberry was rated even worse at 20 points). Skype has weak encryption, scoring only 40. The middle group in the rankings included Google, which scored a 53 for its Allo, Duo, & Hangouts apps, Line and Viber, with 47 each, and Kakao Talk, which scored a 40. The report also stated “that due to the abysmal state of privacy protections there was no winner.” On a side not protecting privacy rights is also part of the motivation behind the Let’s Encrypt Project, which to use to supply free SSL Certificates. Amnesty International has petitioned messaging services to apply “end-to-end encryption” (as a default feature) to protect: activists, journalists, opposition politicians, and common law-abiding citizens world-wide. It also urges companies to openly publish and advertise the details about their privacy-related practices & policies. About the most popular instant messaging app: “Whatsapp” - Facebook has thrown everybody a new surprise twist. WhatsApp is updating its privacy policy. Facebook wants your data and end-to-end encryption is going to soon be shut off. WhatsApp , now owned by Facebook, started some uproar this week after the announcement that it's changing its terms (or privacy) to *allow* data to be shared with Facebook. It means that for the first time Whatsapp will give permission to connect accounts to Facebook. This is after pledging,...

You may find this interesting too.
transpacificcable

Map published by Facebook Google and Facebook are engaging in a partnership to pay for the laying of what will be one of the highest-capacity undersea data cables - piping data in the form of light all the way across the Pacific; bridging Los Angeles & Hong Kong. This project is the second partnership Facebook has joined in. It is yet another current example recent big business in the submarine-fiber optic cable industry. This internet-centric industry has traditionally been dominated by group of private, and government, carriers. Companies like Facebook, Google, Microsoft, and Amazon operate huge-scale data centers that deliver various internet services to people worldwide. These internet big boys have are quickly reaching a point where their global bandwidth needs are so high that it makes more sense for them to fund cable construction projects directly; rather than to purchase capacity from established carriers. Previously this year, in May 2016, Facebook announced that teamed up with Microsoft on a high capacity cable across the Atlantic called “MAREA”. This cable will be linking internet backbone hubs in Virginia Beach, and Bilbao, in Spain. Telefonica will be administrating this future transatlantic data line. Europe and the Asia Pacific region are important markets internet services giants. The MAREA cable will boost bandwidth levels between both companies’ data centers both in Asia and the US. The submerged fibre line is named the “Pacific Light Cable Network”, named after Pacific Light Data Communications, Inc - the 3rd partner of the project. Both the MAREA and Pacific Light cable will be built by “TE SubCom”; one of the biggest names in the submarine fibre optic cable industry. The 120Tbps (Terabits per second) PLCN system will provide greater diversity in transpacific cable routes, as Facebook recently published. “Most Pacific subsea cables go from the United States to Japan, and this new direct route will give us more diversity and resiliency in the Pacific,” Facebook’s article states. read_more One difference that PLCN and MAREA have from traditional transoceanic cable systems is they will be interoperable with different networking equipment; rather than being designed to function with specific or proprietary landing-station technologies. Companies will...

You may find this interesting too.
campaign 2016 trump internet handover dns

The name of the organization with seen to remain the same, “ICANN”, but the people is power over the organization is about to shift, without your vote, Oct 1st to an assemblage of the world body politic, mostly compose of despots and dictators. The effect of this is still yet to be seen, but one key person involved in today’s political fray, presidential candidate Donald Trump, opposed the lackluster plan. Basically, the current domain name system as you have grown to know, and trust, is about to go under changes that could easily lead to intimidation and censorship against free speech. Protection of grassroots political speech is also at risk. The world can go on with less adult websites, but the world simply won’t be as good or nice of a place without freedom of speech in other regards. The founders of America frequently stated that the citizenry must always be vigilant and jealously guard their rights and freedoms. This is the attitude now on the podium of Donald Trump; the only candidate opposed to the plan to hand over control of the internet to a conflicted party of those seeking ever more power in the world. U.S. Republican presidential nominee Donald Trump is currently conducting verbal opposition to the semi-secretively planned transition of oversight of the internet's domain name system (DNS) management from the US-based governance to the UN, a global organization of political stakeholders from around the world; which could abrogate and hand-over control of the internet itself to authoritarian regimes such as China and Saudi Arabia and others; foreseeably threatening online freedom. Internet DNS is basically a directory for internet-connected devices that helps translate domain names to numerical IP addresses. He strongly contends that the US Congress should act swiftly block the handover, scheduled to occur next week on Oct. 1 2016, or as his campaign policy director Stephen Miller stated "internet freedom will be lost for good, since there will be no way to make it great again once it is lost." The ‘handover’ of the internet DNS was proposed in March 2014, implying the transfer of oversight from the nonprofit Internet Corporation for Assigned Names...

You may find this interesting too.
4goodhosting drupal joomla wordpress

You may have heard of the 3 more popular content management applications: Wordpress, Drupal, Joomla - but you are not sure which one is best for your needs. Perhaps you remain curious; so we will focus the the two ‘other’ choices besides Wordpress: Drupal & Joomla. Each particular CMS will provide the basic functions of: adding, deleting, and publishing various types of content. Each program has different strong points (and weaknesses) which should be considered whole-cloth, prior to making your ultimate decision. First write down your business’ objectives and goals. This should be is the first step in selecting the best CMS application suited for your particular business needs. Ultimately, optimally serving your business’ unique target audience. Choosing the right CMS (by the way, easily confused with CNS (Central Nervous System)), is the backbone for your project it will save you a great deal of headaches later. A reliable web host, with super customer support, also saves you from initial and future headaches. With 4GoodHosting.ca you can get both ultra-reliable hosting and the CMS of your choice for free: Joomla, Drupal, or of course; Wordpress - or any of the 200+ free scripts we offer you with any of our hosting package. Drupal: In 2016, there is an estimated 1 million+ websites built atop the Drupal CMS. Drupal is common to government offices, universities and colleges, Non-government Organization, Canadian & otherwise global enterprises. America’s White House website is taking advantage of Drupal’s strong website security features. Drupal is a comprehensive, expandable, powerful content management framework suitable to be the foundation of virtually any type of website. Drupal’s Advantages: * Tested Enterprise-level security; advanced control over URL structure * Lots of functionality - including advanced menu management, graphics modification utilities, poll management, and administration/users management * Built for high performance; pages load fast because of its defaulting caching features * Ability to handle large amounts of content & data * Extensive selection of themes, modules & extensions * Ideal for community platform sites (requiring multiple users - admin, editors, logged in users requiring customized content, private groups, etc.) * Large robust community generally responsive to inquiries and concerns. * Good SEO...

You may find this interesting too.
microsoft

(US & Canadian News) Microsoft actually championed a huge victory in regards to user privacy {which certainly has affect on Canadians using Microsoft products and services: Email, Cloud Storage, Skype, etc.) on July 28th. An appeals court has ruled that a federal warrant to seize email from a Microsoft server in “Ireland” is invalid. Federal investigators received a spy warrant (for email contents) as part of a criminal investigation in December 2013, which touched off a debate between the tech-industry and law enforcement about jurisdiction & data storage. The timing of this coincides with Microsoft’s Worldwide Partner Conference (WPC) - where the company’s president and chief legal officer Brad Smith promoted a vision for the internet that "respects people’s rights" and is “governed by good law.” Microsoft said: “We obviously welcome today’s decision by the United States Court of Appeals for the Second Circuit. The decision is important for three reasons: it ensures that people’s privacy rights are protected by the laws of their own countries; it helps ensure that the legal protections of the physical world apply in the digital domain; and it paves the way for better solutions to address both privacy and law enforcement needs.” Privacy protections for information stored on paper should persist as data moves to the cloud. This decision helps ensure this result. — Brad Smith (@BradSmi) July 14, 2016 Microsoft has publicly acknowledged a need for cloud providers, particularly those based in the U.S., to win back over consumer trust. Representatives for like-minded lobby groups include: the EFF (Electronic Frontier Foundation), i2Coalition, plus big tech companies such as: Rackspace, Apple, Amazon, Cisco, Hewlett-Packard, and Verizon - and notably in this case Ireland’s Parliament - and each submitted briefs in support of Microsoft’s initial statements and position. “We conclude that Congress did not intend the SCA’s warrant provisions to apply extraterritorially,” the judges said in the ruling (PDF). “The focus of those provisions is protection of a user’s privacy interests. Accordingly, the SCA does not authorize a US court to issue and enforce an SCA warrant against a United States‐based service provider for the contents of a customer’s electronic communications stored on servers located...

You may find this interesting too.
4goodhosting upgrade
reading time Reading Time: 3 minutes

Is your website becoming much more popular? If you are searching for reliable yet inexpensive, and fast loading website hosting, “shared web hosting” or “V.P.S.” (Virtual Private Server hosting) service are two good, but not identical, options. The most common choice, to do it at rock bottom costs, shared hosting, but for many businesses the limitations of shared hosting eventually becomes outgrown. Migrating from a shared server plan to a VPS (or an entirely “Dedicated” or “Standalone Server) is typically the next step. 4GoodHosintg provides free upgrade migration services; to solve any nervousness when you may decide to upgrade your website to its own server. Some signs you have outgrown Shared Web Hosting: Skyrocketting Traffic For low traffic websites shared hosting is ideal. If you are noticing your traffic increase consistently, or if you are offering high-bandwidth content such as video(s); you may need to upgrade to a VPS (Virtual Private Server) for dedicated bandwidth, and for a lower-latency (faster) less congested network connections. When your business/website grows in size: your email, disk space, CPU & RAM (Random access memory) requirements will also eventually surpass your existing shared hosting plan. The growth of your business will often dictate the need for upgrades. Choosing between VPS and dedicated server Perhaps you would feel best serving your website by renting your own private server (standalone web server with it’s own dual power supply). However, first consider the differences between VPS and Dedicated servers - to find out which one is best for your application; including cost, as VPS are less expensive than leasing dedicated equipment in our data center. In either case, 4GoodHosting offers numerous advantages: such as 24/7 customer support, “RAID” hard drive and SSD redundancy, dual-coast back-ups, disaster recovery servers, plus the flexibility of upgrading or downgrading your server hosting package whenever you need with free migrations. read_more Maximum Security of your data If your business or organization is dealing with alot of company confidential data - then you should ensure the security of your data. By choose self-contained VPS or Dedicated Server hosting, you will more secure control over who has the ability to access your data. For VPS...

You may find this interesting too.
cloud traditional hosting 4goodhosting 1024x413

The above diagram shows you the architectural difference between cloud hosting solution and traditional hosting solutions. Cloud service partitioning of the overall system stack, as outlined above, only started to become generally promoted in 2008-2009. Traditional dedicated servers, shared server hosting accounts, and VPS hosting were offered all over the internet more than full decade before the word ‘cloud’ became the latest buzzword. This article is a bit different than most every other ‘cloud hosting’ article published so far. How? Well, there has been alot of hype over the past several years about the cloud approach to web hosting. Although cloud hosting is becoming an increasingly popular method of web hosting, there are some disadvantages to that arrangement. As with each kind of hosting, there are pros and usually at least one drawback associated with each type; and each has a significantly different cost. Hosting a website in a public cloud offers some benefits that we will review below, but there is one very significant drawback - which is an inherent lack of control over security/privacy of a company’s business data. This means that your information could be vulnerable to hackers and unauthorized users. After all you would be storing your ‘private’ business information out there in some unknown rather geographical location in ‘the cloud’. Would you simply trust that? If you just have a small website, that showcases your company with some simple functionality such a contact form, then a traditional shared hosting account or VPS (Virtual Private Server) is completely adequate; as it has been for a long time. Shared hosting has been the status-quo since the late 1990s’. Regarding software applications and databases that deal with your actual business data: such as your customer lists, their ordering information, your customer’s personal information or credit-card/banking information, you would logically want that information to be kept ‘in-house’ or internal. Your company’s most important data is usually the proprietary software that your company has developed (usually at great expense), or your company’s entire customer database (which is usually tied together with your customer’s personal credit card or banking details). This is something that you would not normally want to have...

You may find this interesting too.
On This Page G
Explore 4GOODHOSTING
Copyright © 2025 4GoodHosting. All Rights Reserved.
+1 866 708 4678