Blog Header Banner

How to Secure and Protect Your cPanel Server   no comments

Mar 20, 2018 @ 10:08am internet security

Secure and Protect cPanel

cPanel provides convenient server access and an intuitive, user-friendly interface for managing your website. However, like any server application or environment, it can be vulnerable to several potential security problems. As a responsible webmaster or server admin, it’s up to you to recognize these vulnerabilities and take steps to close any loopholes hackers could use to access your server or website. Lets take a look at some of the ways you can secure and protect your cPanel server.


Strong Passwords

From the main cPanel portal to individual email accounts, every login point needs a strong, secure password. Guidelines for length vary, and some sources suggest as many as 14 characters to ensure protection. Longer passwords allow for more complex combinations of numbers, symbols and upper- and lower-case letters. Use a different password for accessing cPanel, FTP, email management and other secure areas, making sure none of them contain obvious information such as phone numbers or birthdays.

If you have trouble coming up with enough different combinations, try an online password generator. A password manager is useful for keeping track of your login information for all of cPanel so that you don’t have to look up each password every time you sign on.


CSF Firewall

A firewall lets you access cPanel while keeping unauthorized users out. Think of it as a border patrol for your server, constantly checking to ensure only the right people get through. ConfigServer Security and Firewall (CSF) is a popular firewall application for cPanel designed to serve this purpose. It scans the system on a regular basis and checks authentication logs to keep your site safe from hackers at all times. CSF also provides feedback on how to make your server more secure overall. Since more is better when it comes to security, check these reports and make any necessary changes as soon as possible.



Although a firewall can prevent hackers from gaining access to your site, it won’t stop them from trying to log in. Brute force protection is a feature of cPanel used to block IP addresses after multiple failed login attempts. Found in the Security Center section, this option is easy to enable and customize. Use the IP Deny Manager to manually input IP addresses known to be malicious so that they’re never allowed to log on.

You can customize the brute force option, known as cPHulk, by setting how many minutes the tool monitors for repeated logins, the maximum number of failed logins allowed and how long each IP ban stays in place.


FTP Access

With anonymous FTP, anyone can log in to your site via FTP with only a username and a generic password. This may be useful for sharing files with a large number of people, but it’s like an open door to hackers. When all users can gain access to your server through such a simple process, every file becomes subject to tampering.

Set your FTP preferences to allow only for SSL logins, and require a password to be entered each time. The setting can be found under FTP Server Configuration in cPanel.


SSH Access

Secure shell (SSH) is a convenient way to access your site from a remote location. Unfortunately, it can also provide an entry point for hackers. Information sent through SSH is authenticated and encrypted to prevent outside manipulation, so malicious users can’t touch it unless they break through your security measures.

The default port of 22 is the most common setting for SSH access. Changing it to another available port and implementing a security key for logins minimizes the risk of being hacked. Switch the settings from SSH1 to SSH2 for additional protection.


Hotlink Protection

Hotlinking is the practice of linking an image or file on one server directly to a page on a remote website. Some people do this in ignorance, assuming the easiest way to embed an image is to use the original link, but it’s generally considered a bad practice. Hotlinked files use bandwidth from your site every time someone accesses them, and this has the potential to overload your servers if too many requests are made.

The Security section of cPanel offers hotlinking protection. Simply enable the setting to prevent third parties from linking to your files. Add an extra layer of security by specifying certain file extensions you don’t want to be hotlinked.


Tweak Settings

While you’re taking care of the larger security issues in cPanel, make sure you don’t neglect less common settings. Open Tweak Settings under Server Configuration to access an entire list of other possible security measures. With this checklist, you can:

• Help prevent the sending of unauthorized emails, including spam
• Shut down potential email attacks
• Block malicious referrals or redirects from hijacking your site
• Stop the generation of proxy domains
• Require IP validation for cookies
• Set up an additional security token for cPanel access

Enabling these supplemental security settings helps address any remaining vulnerabilities and keep hackers at bay.


Automatic Updates

Your web host should have automatic cPanel updates in place. If not, go to Update Preferences in the Server Configuration area and enable the setting yourself. Old versions of software, including cPanel, may contain security vulnerabilities hackers can use to access your server. Automatic updates ensure you’re always running the latest version of cPanel with any associated security patches and bug fixes. Go back and check once and a while to confirm updates are running as they should. If not, update manually and contact your web host to find out why the setting isn’t working.


Security is one area of website management where you should never cut corners to save time or effort. The smartest thing you can do is implement proper security measures for cPanel as soon as your hosting account is set up. Don’t wait until disaster strikes or assume the security promised by your web host is enough. Take proactive measures to keep hackers out and stay in control of your cPanel environment.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 20th, 2018

Tagged with , , ,

Cloud VPS: 4 Reasons to Upgrade   no comments

Mar 15, 2018 @ 10:53am Web hosting

Cloud VPS

If you are in the market for business web hosting, you probably already know how many options are out there. While large, established businesses may need a dedicated server to meet their needs, most small to medium-sized businesses may find that a Cloud Hosted VPS or virtual private server is the best match. A Cloud VPS is a sub-section of a dedicated server. It’s a guaranteed amount of space that is completely isolated from the rest of the server. This means you get a private, guaranteed portion of a server without the risks of shared hosting (in which potentially hundreds of people are using the same machine) and without the expense of a dedicated server. Lets discuss the various reasons why Cloud VPS technology is a good choice for your business.


1. Potential for Growth

When you’re shopping for a cloud or hosting solution for your business, it is essential that you consider your business’ potential for growth. You don’t want to buy server space, get your website up and running and start selling only to exceed your server’s capacity. If that happens your site goes down. If your site goes down, you lose money! A Cloud VPS offers the instant capability of allocating a large amount of space and resources so your business can grow unfettered.


2. Support

Good VPS Hosting comes with robust support. This means you always have a resource if you run into problems. If your site goes down, you have a real person to call. Make sure your VPS Host or Cloud provider has online chat support, a phone number and a ticketing system (TurnKey has all three). There are many hosts out there that do not offer 24x7x365 support. Often these hosts don’t own their hardware and are not always reliable. Do some research before choosing a host to make sure you will get the kind of customer service your business deserves.


3. Security

Cloud VPS hosting offers unique IP addresses alongside password protection, firewalls and security software managed by your hosting company (if you choose the right host). This means your data is secure, regularly backed-up and protected from potential attacks. A Cloud VPS is an excellent choice if you are concerned about data security.


4. Value

If you are concerned about controlling business expenses (and who isn’t!?) a Cloud VPS is an extremely economical choice. You get nearly all of the benefits of a dedicated machine without the large monthly bill. Of course, if your business grows quickly and you find you need more resources, you can easily upgrade from a Cloud VPS at that time.

Our TurnKey Cloud-Hosted Virtual Servers (VPS) offer the highest level of service and the ultimate combination of performance, value, security and ease of use for your hosting needs. Our VPS’s are far more flexible than other hosting options giving your organization full control over the security settings, choice of operating system, control panels, software configuration, and applications. For more information, visit

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 15th, 2018

Tagged with , , ,

3 Ways to Speed Up Your Website   no comments

Mar 6, 2018 @ 10:06am Web hosting

Website Speed Loading

Many online business owners make the mistake of overlooking the importance of having a fast website. When you want to get the most from your online presence, the loading speed of your content is one of the most important factors to your success. Your prospects have a lot of distractions fighting for their attention, and you must compete with their friends, family and other advertisers if you want to make any progress.

Web users don’t have much tolerance for slow websites, and most will navigate away if your content takes longer than a few seconds to appear on the screen. So every step that you take to increase your website’s performance will help you attract and retain customers, and you are about to learn how to get moving down the right path.


1. Content Delivery Network (CDN)

One of the benefits of working online is that you can reach a worldwide audience, and doing so is one of the best ways to enhance your profitability. But when someone downloads your content or accesses your website, the speed at which the content loads will depend on that person’s location. For example, if your hosting server is located in New York, someone who lives in China will encounter delays when trying to access your website.

If your prospects are forced to wait too long, they will often opt to find a local business that can offer them efficient download speeds. You can overcome that problem by using a content delivery network, or CDN. When you have a CDN, your content is stored on several servers around the world. When someone accesses your website or tries to download a file, the CDN will send the files to them from the server that is closest to that person’s location.


2. Check Your Plugins

You can find many plugins or scripts that will help you captivate and engage your audience, but using too many of them can decrease the loading speed of your website. If you want to speed it up, take a look at each plugin to determine if you need it and how much it is impacting your site. Disable one plugin at a time to determine if the changes make a difference in the amount of time that it takes for your content to load. If one of your plugins is causing a lot of harm, consider removing it, but you can also check to see if the developer has released any updates.


3. Upgrade Your Cloud or Web Hosting

If you have tried everything of which you can think to improve your loading speed, then you might want to take a look at your cloud or web hosting provider. If you have a basic plan, then you might not have access to the amount of bandwidth and resources that you need to improve the speed with which your audience can access your content.

If your web hosting plan is the source of the problem, then you might want to upgrade to a better provider. Although you likely wish to avoid spending more money than needed, the enhanced speed of an effective hosting plan is an investment that will pay for itself over time.

Those who don’t take steps to optimize their website’s loading speed are likely losing more customers than they realize, and you don’t want to repeat the same mistake. Putting in a little effort can go a long way when it comes to keeping your prospects engaged and focused on what you have to say. Optimizing your website is a good place to start when you want to make your content load with enhanced efficiency. But if that step does not help, then upgrading your hosting plan is sure to get the job done.

When your website loads quickly, your customers’ experience will not be interrupted, and they will be that much more likely to make a purchase as a result. The speed with which your content loads is also a reflection of you and your products. When you prevent delays, you are also showing your customers that you care about your reputation, and you will start to earn their respect.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on March 6th, 2018

Tagged with , , , , ,

4 Ways to Protect Your Business From Email Phishing   no comments

Feb 27, 2018 @ 9:43am internet security

Email Phishing

Phishing is the process of posing as another person or as a company to deceive people into giving personal or confidential information away, and criminals have been known to use emails as a way to reach their goals. Knowing about the threat is not always enough when your task is to keep yourself and your business safe, and the attack can occur at any time.

An employee will be checking their email as they would on any other day. Suddenly, the employee spots an email from the bank that asks the user to log in to the account to confirm a recent transaction. But the email was not from the bank, and the user’s information is now in the hands of an identity thief. If you don’t want to encounter this situation, then the following 4 tips will help.


1. Don’t Share Sensitive Information Through Email

In a common phishing attack, a criminal will pretend to be someone whom you trust to steal sensitive data. The email could appear as though it had been sent by a friend, boss or business contact, and you might be asked for your account information or pin number. But no credible business will request sensitive data in an email, so the request should be your first red flag.

Rather than sending personal details in an email, pick up your phone and call the company or the individual who requested the information. Although this step might seem a little time-consuming, it can save you from a lot of trouble.


2. Manually Navigate to Web Addresses

Long before sending you a fraudulent email, experienced criminals will put in the effort to clone the website of a bank or business. They will then send an email posing as your bank or another trusted entity, and you will be encouraged to click a link that will take you to a malicious website.

Although the content, logo and other details might appear identical to the real thing, any information that you send will be exposed. Avoiding this type of attack is not difficult. Simply open a separate web browser and manually navigate to the website that you intend to visit.


3. Look for Spelling Errors

Keep in mind that phishing attacks can come from any location on the planet, so a lot of fake emails are sent by those who don’t speak English as their first language. When someone from another country sends a fraudulent email, the message will often contain obvious spelling errors. Some people dismiss the spelling errors that they find, but they will likely have their personal information stolen as a result. Customer service agents can make mistakes, but using caution is the best way to avoid becoming a victim.

Also, even criminals who speak English fluently can make mistakes when typing an email. If you notice anything that seems odd, call the company or person from whom the email appears to originate and ask for verification. If the email is not legitimate, report it as spam and block the domain.


4. Don’t Trust Attachments

Downloading and running email attachments is a good way to get a virus or to have other malicious software installed on your device. In the past, hackers would use screen savers and free games to infect their victims, but hackers can even use Word and Excel documents to inflict damage. After a computer is infected, the malicious code will sometimes automatically email itself to everyone in the victim’s address book. If you want to avoid this problem, never download an attachment that you were not expecting.


Having your identity stolen can destroy your credit score, and some people are forced to wait years before they can reverse the damage. Nobody should overlook the threat of phishing, and you can never eliminate the risk entirely. But you can significantly reduce the odds of having your personal or business information exposed by keeping safety at the front of your mind. Protecting yourself and your business will require some time and effort, but safeguarding your information is always easier than trying to pick up the pieces after an incident occurs. Those who focus on security when communicating online will follow these tips, but they will also use common sense to detect the signs of suspicious activity.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 27th, 2018

Tagged with , ,

6 Reasons Your Business Should Use Data Center Colocation   no comments

Feb 20, 2018 @ 10:34am colocation

Data Center Colocation

Businesses need their online and IT operations to run with super speeds, be secure, maintained, monitored, and most of all be redundant. Some businesses decide to use in-office or on-site server rooms, while others utilize colocation solutions from a Data Center.

A server room can be any room, in any building that houses servers. Whereas with colocation, your IT infrastructure is housed in a Data Center; a whole building designed to support and provide a secure, power protected, environmentally controlled space, used for accommodating servers, networking, and computer equipment. When deciding where your business should host/store it’s IT equipment, there are 6 main reasons why you should choose Data Center Colocation over an in-office server room:


1. Security

Most Server Rooms do not have a high volume of security. Besides the buildings overall security, there may be a lock on the Server Room door. Data Centers pride themselves in the security features they offer. All entrances and exits are secured with a key coded entry system, as well as alarms. Not just alarms for entry. Alarms for temperature control, air pressure, fire/water control, etc. All Data Centers have network cameras, accessible to their staff and security team in a needed event. The racks the servers are housed in are all locked. Only opened when your team needs to visit or by the Data Center staff, if needed.


2. Connectivity

What good is your server if you have a fixed bandwidth rate? Most Server Rooms are capped off by their local Internet Service Provider (ISP) as they are using a residential internet service. Data Centers do not use any type of residential internet service and most times are able to set the bandwidth limits as they are needed by the server.


3. Redundancy

If there is a power failure at your business, do you have a backup power plan? Most Server Rooms run from the same power source, as the full office. Making your sites and servers go down if there is ever a power failure. Data Centers have a plan for any type of failure. When it comes to power failures, most Data Centers have battery backups, automatically triggered if the main power supply is not responding. When the system sees the backup batteries are being utilized, another backup power source is engaged, the generator. At this point the battery backups turn off and all power is controlled by the generator until normal power is restored.


4. Affordability

With a Server Room, you are accumulating all the costs that go along with it. You may have had to cut advertising short or possibly even lay off good employees as the costs to maintain and house your equipment have risen. At a Data Center all those costs are tied into your colocation package and at a much, much lower cost.


5. Environment

Data Centers control the cooling and humidity – to a precise and perfect level to keep your equipment running as long as possible. Storing equipment in non-conditioned environmental space like your server room or office closet will shorten the life of your equipment significantly (meaning it will cost you real money to replace broken equipment sooner). Electronics are sensitive to things like electrical and static shock, which occur due to improper humidity (moisture) and you can even find corrosion on the electronics in some poor environmental conditions. Its crucial if you have valuable equipment to store it in a properly humidified and cooled location like a Data Center.


6.  Green

Some modern Data Centers, like TurnKey Internet’s Green Data Center , offer one additional benefit ontop of everything above.  Your IT equipment and servers consume less energy, in terms of cooling and power draw, in a modern green-focused data center – and in TurnKey Internet’s Data Center your equipment consumes energy provided only by the Sun (on-site solar array) and Water (Hydro power) providing zero carbon foot prints for your IT infrastructure versus having it at your office.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 20th, 2018

Tagged with , ,

Data Centers: Keeping Your Data Safe in the Cloud   no comments

Feb 13, 2018 @ 10:09am cloud

data center security

The question of where to store data and sensitive information continues to concern many businesses. If you are like most companies, you worry about the security of your data. You may be thinking that you need to keep the data as close to you as possible, storing it at your own on-site server room where you can “keep an eye on everything.” How could you possible know what is happening with your data at a data center far away from your office space?

The fact of the matter is, however, that your data is much more secure at a data center, than on your in-house servers. A data center is able to offer you many more security features and guarantees for your data than you have in your own space. However, you have to feel comfortable with your data center keeping your data. A quick look at the many benefits of cloud storage may help convince you.


Benefits of The Cloud

Choosing to migrate your data and IT infrastructure into a data center or cloud provider is no easy decision. However, the number of benefits that data centers offer to you and your business can make this change well worth it. Consider the many benefits, including:

  1. Data security – Possibly the most important aspect of cloud storage, data security is the main priority of data centers. With some high-profile companies becoming the victims of data breaches in the last couple of years, data centers and cloud providers have upped their investments in access control, identity management, intrusion prevention and virus and malware protection. These improvements have resulted in increased security protocols and more protection for communication between users and servers.
  2. DDoS protection – Distributed Denial of Service (DDoS) attacks are designed to overwhelm servers, flooding them with requests until the security breaks down and actual user needs are ignored. Such an attack can derail a business quickly, losing revenue, customer trust and authority. Data centers are now providing services that monitor and protect against DDoS attacks.
  3. Regulatory compliance – Data centers are required to follow the industry and governmental regulations that oversee their sectors. This includes guarantees and restitutions for your data in the event of a breach.
  4. Reduced in-house data costs – Migrating all of your data and infrastructure into a data center will allow you to reduce the size and cost of your on-site location. For example, you will be able to remove servers, lower your software costs and potentially reduce IT staff without compromising the integrity or security of your data. Most cloud storage is paid on an as-needed basis, so you will only pay for the amount of server and infrastructure capacity that your business needs, and you can change that amount at any time.
  5. Constant availability – Data centers are exceptionally reliable. The connection is on 99.99 percent of the time, only going down for maintenance, and you will have access to your applications and data at all times and from practically anywhere.
  6. Improved mobility and collaboration – The Cloud is available to those who need it no matter where they are located. With today’s internet connections via tablets and smartphones, you will be able to access your data and your applications no matter what you are doing. You can also share your information and conduct collaborations via shared storage capabilities offered by cloud providers.


Choosing the Right Data Center

Once you have decided that storing your information in the cloud is the right decision for your business, you will need to find the right data center provider. You are placing all of your important data in the hands of this provider, so you must make sure that you choose the right one.

The best way to find the right data center is to begin by talking to some of the provider’s current clients. These are the people who have already made the decision to trust the provider, and they will have the best insight into how the provider works and what it can offer. Try some of these questions to discover more about the service that you are considering:

  • Did you find the on-boarding process relatively easy to accomplish?
  • Did the service provide education and training about the new technology for your staff?
  • What is the technical support like when you encounter problems with the service?
  • Have you personally experienced any serious security concerns or incidents?
  • How have your security concerns been handled by the provider?

If you are dissatisfied with any of the responses to these questions, you do not have to use that particular provider. Keep looking and asking questions until you find a data center that meets your needs and that makes you feel comfortable.


Your Security and Peace of Mind

Technology is constantly changing and improving, and you need to be able to trust that your data center will keep up with the evolution of security needs. For any cloud service, find out whether there are security protocols in place, including:

  • Physical security of the data center
  • Environmental controls
  • Back-up measures for power and internet
  • Back-up measures for your data
  • Technical support when you need it

Frequent system audits are also necessary in order to ensure that all servers meet or exceed industry standards for data security.

When you are searching for a data center, ask potential candidates about their compliance to SSAE 16/SOC1. This set of standards measures the amount of control that a service organization maintains over your sensitive data and financial information. An audit will report any flaws in data flow. You should also inquire about compliance to the Health Insurance Portability and Accountability Act (HIPAA). This regulation ensures the security and privacy of private health information that is stored on cloud services. A HIPAA audit will demonstrate holes in the security of such specific and sensitive data. If your data center choice is compliant with both of these standards, you can rest assured that your sensitive data will be monitored and its integrity will be maintained.

Choosing to put your business information in a data center rather than housing it on-site is an important decision that requires careful vetting of your potential provider. Once you have chosen a service, you can trust that a data center will keep your important information safe and secure.

TurnKey Internet owns and operates its own private data center located in New York’s Tech Valley region. Our SSAE-16 Certified data center was a former U.S. Government building that was purchased by TurnKey in 2010. It is made to U.S. Federal Government standards, with 1-foot thick concrete along the perimeter, plus additional reinforced walls and security enhancements. We have installed advanced security systems, and infrared based surveillance monitoring cameras. Employees all undergo background screening, and clients are not permitted within the facility except with photo ID and escorted by trained security personnel at all times. Owning our data center, we have been able to design, build and maintain every aspect of its construction to provide an ideal hosted server environment. This allows us to provide our clients fast, secure and reliable performance at all times. For more information, visit


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 13th, 2018

Tagged with , , ,

5 Tips to Secure Your Dedicated Server   no comments

Feb 6, 2018 @ 9:33am dedicated servers

Secure Dedicated Server

If you have a dedicated server, it’s essential that it is protected. Whether the server exists to host files for a website or is networking computers for a business, it needs to be protected from malicious software and hackers. Malicious software can include a variety of types of harmful programs, including malware, viruses and rootkits.

Failing to secure a server can lead to lost or corrupted data, damage to devices connected to the network and unauthorized individuals getting access to sensitive data. There are a number of ways that you can protect your server, and they go beyond simply having a suite of protection software in place, although that is also key.


1. Anti-malware Software

Even if you’re renting a dedicated server from a Web Hosting or Cloud provider, you still need protection against malware. Large names in security make software that can protect servers from malware, and many are available as suites that allow you to get firewall, antivirus and antispam protection all in one package. You may also decide to select individual programs to provide protection for your server. The main thing is that you have a complete set of software that protects against intrusion and will scan files for viruses and the like.


2. Keep Your System Updated

One way that hackers get into many systems is by going through weak points that developers did not notice when creating a piece of software or an operating system. This is why both computers and mobile devices need regular updates. Along with offering new options, updates close off back doors and holes in the security of software.

Therefore, it’s important that all software hosted on a dedicated server is kept up to date. For web hosting servers, that means cPanel, even content management systems (CMS) such as WordPress and the plug-ins the CMS uses must be kept current. Many operating systems and software suites can be set up to update automatically, but if you’re not comfortable with that, it’s important that you have some way of being notified when important changes are available.


3. Change Default Settings

There are a variety of default settings that come with programs and even operating systems. They include everything from preset usernames and passwords for admin access to default connection ports. Anything that is left as set up by the software manufacturer may be used as a way to gain easier access to a system.

If you can change, without causing problems for the system, addresses, folders, logins and port settings, you should do so. Even leaving the URL for admin access to a server or programs on the server can make it easier for hackers to get in. There are hacking tools that specifically scan websites and servers for default URLs and folders, so changing default login locations is important. On this same basis, it’s a good idea to make sure that directories are protected so that people cannot see their contents.


4. Use Robust Passwords and Keep Track of Permissions

Another important part of keeping your dedicated server secure is to ensure that passwords are robust and that people are only given access to areas that they need to do their job. Aside from malice, giving an intern administrative access to databases could lead to major problems through simple error.

Two key parts of keeping your dedicated server secure in relation to passwords are ensuring that simple passwords are not in use and that passwords are changed on a regular basis. There are a number of ways to tackle the issue of making sure passwords are complex enough, including using computer generated passwords or using passphrases. Computer generated passwords normally require certain characters, length and require a combination of upper and lower case letters; passphrases are combinations of words, and they tend to be easier to remember and more secure than passwords. There should also be a set time that passwords expire, which will require users on the network to change them on a regular basis.

Along with ensuring that people are only given access to parts of the server that they need to have, it’s important that permissions are updated when people leave a job or move to a different part of the company. This can be done with proper database management and doing occasional audits to ensure that access levels are appropriate.


5. Employ Brute Force Detection and Active Monitoring

Another important part of keeping a dedicated server secure is knowing what is happening with it at all times. Even the best anti-malware software cannot prevent all intrusions, and hackers are constantly figuring out new ways to circumvent security systems. Therefore, it’s important that activity on a server is always being monitored.

Things that normally indicate a problem include incredibly high data transfer or processing power use as well as multiple failed login attempts. Brute force hacking involves trying to login to a system over and over again with different login and password combinations. In addition to draining system resources, it can also eventually allow a hacker to find a combination that lets them into your system. Real-time monitoring can help detect these issues and alert the appropriate people, and it can also shut down brute force login attempts.


For those of you who feel there’s just not enough time in your day to maintain your dedicated server’s security, or if you just prefer someone else does it for you, at TurnKey Internet we got your back. We offer Fully Managed solutions that include Server Hardening. We’ll take care of securing and protecting your server so you can focus on running your business. For more information, visit


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on February 6th, 2018

Tagged with , , , ,

Data Center Solutions for Disaster Recovery   no comments

Jan 30, 2018 @ 10:08am disaster recovery

Data Center Solutions

Businesses that have the potential to be affected in some way by natural disasters can avoid the complete standstill to their services by preparing and planning out just what they would do if their facility suffered a catastrophic loss. Hurricanes, earthquakes, tornadoes, snow storms, flooding, and fire are some of the most obvious causes of potentially disastrous losses that could halt the operations of a business. In fact, the property of a business does not even have to have any direct damage for a natural disaster to halt their business. For example, loss of electricity, telephone, or internet connectivity can cause problems with functionality, as those services are paramount. If you understand that any type of disaster could destroy your computing infrastructure – where all of your company records and data are stored, which could quite possibly destroy your business – then you should have a plan in place to alleviate that possibility.


Off-Site Backups

At the very least, any business that uses computing to manage their operations should have an off-site back-up of their most important data and records. This is not a very expensive strategy, it is something that can be entirely automated, and it does not even need to be accessed until you actually need to use it. There are automated back-up systems available from most data centers, which back-up your data as frequently as you desire. The incremental changes made in the time-frame chosen are then sent across the internet through an encrypted protocol, and stored in a managed backup system at the data center. Usually, the client is provided with a secure web interface to access those files as needed. These backups can also be used to restore individual data files that may have become deleted or damaged at any time, and downloaded back to the computers in your office.


Infrastructure as a Service (IaaS)

The next step up from simply backing-up your data for protection from a disaster would be hosting some, to all, of your regular computing infrastructure in a data center. This type of solution is known as Infrastructure as a Service or IaaS. If you hosted your main office server in a data center and accessed your files over the internet from the PCs in your office, you could survive a disaster from a computing standpoint. All of your important data could then be accessed from a temporary, remote location, or even by having your employees work from home until the office is re-established. Many companies are now hosting their entire computing infrastructure in a data center; everything from virtual PCs to their application servers. These can then be accessed through just about any device that is connected to the internet, such as a PC, Mac, tablet, and smartphones.


Email and Phone

Communicating with your customer base during and after any disaster is vital in many cases. When your email and telephone systems are cut off, and you and your customers can no longer communicate, this could be extremely damaging to your business. By hosting your email server at a data center, you have access to your email system through almost any device connected to the internet. Another popular data center service is VOIP-based hosted phone systems. In a VOIP-based system, the PBX system normally nailed to the wall in an office is replaced by a PBX server in a data center. Management and administration of the system is then done though a web interface. All phone communication is channeled through voice over Internet protocol (VOIP). The advantage of this in a disaster is that your phone system is always intact. You can access your administration portal over the Internet and change any settings that may be necessary, such as adding additional extensions for remote users. Staff members can work from remote locations or at home, by accessing the phone system with a softphone on their PC or by having their calls transferred from their extensions to their cell phones.


Data centers are great solutions to the issues surrounding disaster recovery. The key reason is that they have multiple redundancies in place to provide 100% up-time guarantees. At TurnKey Internet, we have multiple fiber providers supplying our internet and bandwidth through diverse physical paths into our facility. We have complicated switch gear in place to maintain your connections, in case one or some of the fiber connections coming into the building are disrupted. Additionally, our power supply is backed-up with both a robust battery back-up supply to all servers and equipment, as well as dual on-site diesel generators that can power our facility long-term if necessary. For these reasons and more, anyone considering disaster recovery planning should consider the options available from TurnKey Internet, to insure that their business is not damaged long-term by a catastrophic event that had not been planned for.

To get started, visit for a FREE consultation.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

4 Benefits of Web Hosting on a Dedicated Server   no comments

Jan 23, 2018 @ 9:17am dedicated servers,Web hosting

Benefits of Dedicated Servers

Both large and small businesses are faced with a wide variety of choices and options when it comes to finding a web hosting solution for their website, company email and data. One option is shared hosting, in which a single server’s resources are shared by a number of different websites and users.

However, if you’re looking for more power, control, and flexibility, the solution for you may be a dedicated server. With a dedicated server, you and your business have exclusive use of that server’s resources. You also have the flexibility of customizing the server’s CPU, RAM, and disk space based on the needs of your website and business.

Let’s take a look at 4 specific advantages of choosing a dedicated server:


1. No Shared Resources

When using a dedicated server, every bit of power, storage, and bandwidth is exclusive to you and no one else. Not only will this give your business more room to work with and expand, it will also prevent issues with your site caused by other websites. For example, if you’re site is hosted on a shared server where there is another website that is being attacked or hogging up resources, this can affect the performance of your company’s site.


2. Flexibility & Customization

A dedicated server allows your business to customize the hardware and software based on your company’s unique needs. Things like CPU, Memory, Hard Drive, even the speed of the server’s network port, can all be customized and upgraded on dedicated servers. With shared hosting, you are limited to the software already installed on the server, and sometimes it may lack a requirement or feature your business needs. But with a dedicated server, you have full flexibility over which software the server runs, even down to the Operating System.


3. Administrative / Root Access

Another downside of shared hosting is the lack of Administrative or root access to the server. This limitation affects what software you can install as well as the settings and options that you can configure on the server. This can greatly impact the potential of what you are able to do with your website. Another advantage of administrative/root access is the ability to better monitor and troubleshoot your website, with full access to the server’s logs.


4. Dedicated IP Address

Each dedicated server comes with its own dedicated IP address. With shared hosting, your site may be sharing an IP address with multiple websites. If your website happens to share an IP with a site that spams or contains malware, this can cause multiple problems. Your website can end up getting blocked, your email rejected as spam, even your search results can be affected. Another thing to consider is whether or not you’ll be running an e-commerce or selling things on your site. If so, you will need to have an SSL for your site, which in turn requires a unique dedicated IP.


Now if you’re worried that you’re not tech savvy enough to run your own dedicated server, consider the option of going with a Managed Dedicated Server solution, which will provide many additional benefits on top of what’s listed above. Also if cost is a concern, check out TurnKey Internet’s ‘Best Value’ Dedicated Servers. There are countless other advantages to using a dedicated server, however the 4 above are some of the most notable. So before you decide to host your website on a shared server, consider the added flexibility, reliability, and performance that only a dedicated server can provide.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on January 23rd, 2018

Tagged with , ,

3 Ways to Backup Your Server in the Cloud   no comments

Jan 16, 2018 @ 10:28am backup

Backup in the CloudWhen protecting data on your server is your No. 1 goal, utilizing a backup solution is a must. However, if all of your files and backups are stored on the same server, you risk losing everything if that server gets destroyed or compromised. The good news is that you can combat this problem by utilizing the Cloud. There are multiple methods that exist for creating server backups in the cloud, but today we are going to focus on three of the most popular ways.


1. Bare Metal Backups

In disaster recovery, a bare metal restore is the process of reformatting a computer from scratch after a catastrophic failure. This process entails reinstalling the operating system, applications and if possible, restoring data and all settings. Bare metal backups allow you to restore to a brand-new, un-configured server as the backup includes all information to setup the machine and move the data over. This results in a ready to go backup server.

At a deeper level, bare metal backups work by taking a “snapshot” of the server. This snapshot includes every file and folder that exists on the server, including all hidden files and directories. This snapshot is then pushed to the cloud, where the entire image can be deployed at a moment’s notice. If you have a Windows server or even a Linux server, bare metal backups will copy the entire operating system structure. Usually, these backup images are the rather large as they are an exact replica of your running server.

For example, let’s say that you have a full power outage at your company. Upon the power returning, you realize that your main hosting server has lost all data. It can’t find the boot record to load the operating system and all files have been removed. With a bare metal backup solution, you simply login to your bare metal software, select the server you want to restore, and viola. The operating system is re-installed with all applications. It’s as if the major system failure never occurred!


2. Cloud Backups

A cloud backup is a piece of software that takes a snapshot of your server and then stores the backup in the cloud. What exactly do I mean by the cloud? The cloud is a piece of software that is stored off-site that can be accessed from any location. Cloud backups allow for greater flexibitily then a local disk or tape backup. A disk backup or tape backup has the limitation of only being able to access the data locally. This could mean data is being stored on a different server that is stored in your local office. In order to access the backup, you would have to drive into your office, connect the two servers and then migrate the data over.

Do you already see the disadvantage to this type of local system? What if you’re traveling and have a disaster and need to restore your data? How will you do it if your business only keeps local backups? This is where a cloud backup comes into play. Since the backup is stored off-site and can be access via an internet connection, you can restore your data from virtually anywhere in the world. This allows for greater flexibility in your backup solution. Also, another disadvantage to local backups is the size or space requirements for the backups. Say you have 1TB of data you need backed up, but you only have 500GB worth of space. What will you do? More than likely, you would just add a new device to your backup software. This may be an additional hard drive, a USB drive or maybe a network attached storage.

Well with a cloud backup, you can just increase the resources of the cloud storage to accommodate your increasing space needs. This allows for you to be able to rapidly add more space to your backup server to accommodate your increasing data space requirements. Now, in no way am I advocating that you should remove your local backup options, but instead add another layer of redundancy to your current system such as a cloud backup. Having local backups and cloud backups are a great way to maintain business continuity.


3. Virtual Server Backups

Virtualization allows for one physical server to act as several servers. This dramatically reduces computing costs and boosts efficiency. One of the main challenges with backing up virtualized servers is the need to backup the virtual server’s data as well as the main host node’s data. When I say, host node, I’m referring to the original, physical server that contains all of the virtualized servers. The reason you need to keep backups for both the host and the virtual servers can best be summed up with an example.

Your business has decided to virtualize all of the servers in your office. Fast forward a few months and you have a major system failure within the host node. Your main hard drive dies and you lose all virtual servers that were stored on the host node. Luckily, you have a backup of the host node and just restore the backup for the host node. However, upon checking the server, you notice an error. Your main host node system files were restored, but all your virtual servers data is missing.

This example illustrates why you need to have a backup of the physical host node and the virtual servers. The physical host node contains the system files that your primary Virtualization software or operating system needs to run. The virtual servers would also need a backup to restore the user data that has been created in each virtualized server. Usually the virtualized servers have a different type of operating system then the host node would contain. You would need server backup software that can handle creating backups of the virtualized servers as well as the main host node itself.

You could have local backups of both the host node and the virtualized servers that you can restore. You could go the bare metal route for the host node as well as virtualized servers, or even the cloud backup method. It’s just important that you have backups of both the node and the virtual servers.


Not sure which of these backup solutions is best for you and your business? Contact the Cloud Solutions Experts at TurnKey Internet! To get started, visit for a FREE consultation.


Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on January 16th, 2018

Tagged with , , , , ,