Security

Access/Users/Passwords

At the host level, access means physical access to the machines, as well as the ability to log into the server. Only authorized personnel can access our websites and have a strict password policy for employees with mandatory password changes at regular intervals as well as when equipment or personnel changes.

Up-time/Availability

Server and Network up-time are dependent on a variety of issues, ranging from the activity by our clients, traffic to other sites, hardware failure, to issues like hard-drive failure and file corruption. Most issues are resolved in approximately 15 minutes. However, on extreme issues, it may take more than 15 minutes to resolve. In these extremely rare circumstances, the server may require additional time to resolve the issue. This can take several hours and in very rare cases as much as a day to get your server back up and running. At any time, should you have questions or comments, you may contact us via Phone or Live Chat. We appreciate your business and look forward to a continued relationship of honesty and trust.

Network Monitoring

We offer 24/7 Network Monitoring, monitors the in-flow and out-flow of data via your website’s network. Our software and team check the health condition of network devices critically, as well as some other lines of business applications. This way, an issue can be detected earlier before it causes a downtime on the entire network.

SSL, Firewalls, and DDoS Prevention

SSL (secure sockets layer) technology is required when sensitive data is transferred to and from the server. Internet users associate SSL with the padlock that appears in your browser's address bar when you enter the secure area of a website. They know to look for this before entering any personal or financial information online. If information is entered on an unsecured website, the data is transmitted from your computer to the web server non-encrypted and view-able in plain text. Anyone 'sniffing' packets on the network or on the internet can capture your information and use it fraudulently. Distributed-Denial-of-Service (DDoS) attacks happen when more data usage is used by your server than you have available, this is usually done by a tremendous amount of server requests sent by multiple traffic sources. We have customized internal tools which mitigate these attacks automatically and they largely go unnoticed by customers.

Antivirus and Malware Scanning and/or Removal

Malware can result in the theft of file, data and personal information. This can result in to loss of trust from clients but also could you lead to legal complications if sensitive data is leaked. Search engines tend to blacklist a site if it is found to have malware. Protection from malware helps to keep websites seen as secure, trustworthy and are in line with SEO practices.

Backups and Restore Points

A secure backup provides a trusted repository for the latest copies of the system and data that can be deployed to restore a known, clean system to operation. Over time, websites are tweaked and changed and those changes often won't be reflected in the original version. Most content is uploaded through the CMS interface and configurations are done through the online UI. Having an up to date back up in place will allow you to get back online quickly after a mishap. There are many reasons why you need to get your website back online quickly including loss of traffic and SEO penalties. Keeping a backup may be your easiest, and best protection, in the event of a mis-configuration or error there will be the option to restore your site.