Blog Header Banner

Archive for the ‘Web hosting’ Category

What is Colocation?   1 comment

Posted at Oct 10, 2017 @ 9:00am colocation,Web hosting

Colocation POD

Colocation or ‘Colo’ is a solution offered by major data centers that provides businesses and organizations a place to host their servers and other IT hardware in a secure, high-tech facility. Whether it’s a small business that doesn’t want to hire an entire tech department, a large company that wants the stability and security of a data center, or somewhere in between, Colocation offers benefits to all types of businesses.

 

Security & Protection

Most data centers that offer colocation have high levels of physical security. Features such as security cameras, 24×7 on-site staff, individual cages or cabinets have locks, as well as biometric scanning at all access points and more! If the proper security is in place, a data center may also be SSAE-16 certified. This allows businesses to colocate their equipment and benefit from the SSAE-16 compliance already in place to avoid costly and time-consuming auditing of your company’s office or facility.

With Colocation, businesses own their equipment. Since they own the equipment, only their staff has access to it and the data it holds. Unlike typical web hosting solutions, where data may me stored on a shared server, they will be the only ones with access to their data.

 

Uptime

Most businesses run 24×7. Even after ‘store hours’ a business needs to be online and connected, especially if they operate an online store or website. Being down for minutes or an hour can spell disaster. Imagine an organization’s IT infrastructure down for a day or a week while the power’s down due to a storm.  This disrupts potential clients from accessing their servers! In a colocation facility like TurnKey Internet’s datacenter, your company’s IT infrastructure is housed in our redundant, high-speed Internet-connected facility, with continuous power provided by industrial UPS battery systems and on-site diesel generators for emergency backups.

 

Room To Grow

In a typical office IT environment, if a company quickly needs to increase bandwidth or add physical space to the office, they could wait weeks or even months. When their infrastructure is located in a colocation facility, they can provide huge amounts of additional bandwidth within minutes or hours. A typical data center can have a bandwidth capacity 10,000 times that of a typical office cable Internet connection.

 

Cost Savings

Businesses that build their own on-site IT infrastructure can spend hundreds of thousands of dollars, if not millions, to have the same bandwidth capabilities and enterprise grade power and cooling systems featured at a colocation facility. Fiber optic lines, connecting to major internet hubs across the world are not purchased for pennies either! Add in redundancy to their office, and businesses are paying tens of thousands of dollars a year. On the other hand, if they instead chose to utilize a colocation facility, it might have cost them less than $100 a month.

 

Colocation is the ideal solution for companies, service providers, small businesses and IT resellers who want a stable environment in which to completely control their assets. It provides complete control of your hardware, software and networking to match your needs without worrying about the supporting infrastructure. By colocating with TurnKey Internet, you are able to focus on your business and not on office networking, power or server issues that plague localized installations and office infrastructure. We provide redundant networking, power and cooling to ensure your services remain online and accessible at all time.

To learn more and receive a FREE consultation, visit www.TurnKeyInternet.net/myplan

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on October 10th, 2017

Tagged with , , , ,

RAID: The Upgrade Your Server Deserves   no comments

Posted at Aug 22, 2017 @ 9:46am Web hosting

RAID: The UPGRADE Your Server Deserves

A Redundant Array of Inexpensive Disks (RAID) is a system that utilizes multiple hard drives simultaneously to act as a single storage volume. Using a controller that manages the operation of the hard drives, you can configure a RAID array to do the following:

  • Stripe data across multiple drives, reading and writing data across all drives simultaneously for double the performance — or more — when reading or writing large blocks of data
  • Mirror data across multiple drives so that each drive in the array contains an exact copy of the same data
  • Create Parity blocks on each drive in the array, making it possible to recover the lost information if a drive fails — and to keep the array running while rebuilding the failed drive

RAID has several implementations — or “levels” — that utilize striping, mirroring, parity or a combination of the three. We’ll explain those more fully later in the article, but for now there’s one thing you need to know: If you have a home or business server, you need RAID. RAID is the one solution that can make your server faster, do a better job of protecting your data and continue operating while you rebuild data after disk failure.

Although an exhaustive list of all RAID levels is outside the scope of this article, this brief list should help to explain the features and benefits of RAID in greater detail:

 

RAID 0

A RAID 0 array requires at least two hard drives. In RAID 0, the controller splits all data equally across all hard drives. Each drive works simultaneously during read and write operations, increasing the speed of the volume to far greater than that of a single hard drive.

Strengths and Weaknesses: A RAID 0 array excels in increasing a server’s storage performance. However, all data in a RAID 0 array is lost if one drive fails. You can add additional drives to a RAID 0 array to increase its performance further, but adding more drives further increases the risk of failure.

 

RAID 1

In a RAID 1 array, every hard drive contains the same data and the controller writes to all drives simultaneously. A RAID 1 array provides excellent data redundancy because all of the data survives unless every drive in the array fails.

Strengths and Weaknesses: In addition to data redundancy, RAID 1 can slightly increase a server’s read performance. When the controller requests data, the drive that can access the data most quickly will retrieve it. However, RAID 1 provides no increase in storage capacity past that of the smallest hard drive in the array because each drive contains the same data. In addition, the slowest hard drive determines the write speed of the entire array.

 

RAID 5

A RAID 5 array stripes the data across multiple drives like RAID 0. However, every hard drive also carries parity data for each block written. Using the parity data, the controller can rebuild the entire array if one drive fails — and the array can continue working during the rebuild process.

Strengths and Weaknesses: The greatest strength of RAID 5 is that it offers increased reliability without sacrificing a great deal of storage capacity. Unlike RAID 1, the total capacity of a RAID 5 array increases each time you add a hard drive. However, parity data does take up some space. A RAID 5 array with four 1 TB hard drives will have a total capacity of about 3 TB.

RAID 5 offers better read performance than a single drive because the striping allows multiple drives to read simultaneously. However, the write performance of RAID 5 is relatively poor because of the extra time required to write parity data.

 

RAID 6

RAID 6 is similar to RAID 5 in design, but it devotes an amount of storage equal to that of two hard drives — rather than one — to parity so it can tolerate the failure of two drives without losing data.

Strengths and Weaknesses: A RAID 5 array can tolerate the loss of any one drive. However, hard drive manufacturers state that about once every 12.5 TB, a hard drive will encounter an unrecoverable read error. If you have a RAID 5 array with four 4 TB drives and one drive fails, the remaining capacity of the array is about 12 TB. If one of the remaining three drives experiences a read error when rebuilding the array, the rebuild operation will fail. If you use more hard drives — or larger hard drives — the chance of failure is greater. So, RAID 6 is far more reliable than RAID 5 for very large RAID arrays. However, because RAID 6 doubles the amount of parity data, write operations are slower.

 

RAID 10

RAID 10, or RAID 1+0, is essentially the combination of RAID 1 and RAID 0. It combines disk striping and disk mirroring to provide redundancy and performance. Due to it’s incredible performance benefits, RAID 10 is one of the most ideal solutions, especially for intense applications and databases.

Strengths and Weaknesses: The greatest strength of RAID 10 is that it offers maximum performance while also maintaining redundancy. The only disadvantages of RAID 10 are that it requires a minimum of four disks and only 50% of the disk space is usable due to mirroring.

 

RAID has become a vital necessity for any business looking for safety and performance when it comes to their website and/or critical company data. If your business is currently running on a server without RAID, you risk not only data loss, but also the added performance that can separate you from your competitors. Now is the time to upgrade your business to a RAID solution.

At TurnKey Internet, RAID upgrades are available on all of our Dedicated Servers. Best of all, our latest Best Value Dedicated Server already includes RAID 10, making your upgrade even easier! Start enjoying the added performance and safety of RAID today.

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on August 22nd, 2017

Tagged with , ,

Securing cPanel   no comments

Posted at Jun 20, 2017 @ 10:20am Web hosting

Securing cPanel

cPanel is one of the most popular web hosting control panels available today. With it’s user-friendly graphical interface and robust server automation tools, cPanel is designed to make web hosting as simple as possible. However, like many other popular applications, it can be vulnerable to potential security problems. To prevent your website from falling victim to hackers and malware, it is critical that you manage and routinely check your server’s cPanel security settings.

 

SSH

SSH or Secure Shell, is a common way users access their server or website remotely. Unfortunately, it also provides an entry point for hackers. Data sent through SSH is authenticated and encrypted to prevent outside manipulation, so malicious users can’t touch it unless they break through your security measures. The default port of 22 is the most common setting for SSH access. Changing it to another available port and implementing a security key for logins minimizes the risk of being hacked. Switch the settings from SSH1 to SSH2 for additional protection.

 

Firewall

A firewall lets users access cPanel while keeping unauthorized individuals out. ConfigServer Security and Firewall or CSF, is one of the most popular firewalls for cPanel. It scans the system on a regular basis and checks authentication logs to keep your site safe from hackers at all times. CSF also provides feedback on how to make your server more secure overall.

 

Brute Force Protection

Although a firewall can prevent hackers from gaining access to a website or server, it won’t stop them from trying to log in. Brute force protection is a feature of cPanel used to block IP addresses after multiple failed login attempts. Found under the ‘Security Center’ section, this option is easy to enable and customize. Use the IP Deny Manager to manually input IP addresses known to be malicious so that they’re never allowed to log on. You can customize the brute force option, known as cPHulk, by setting how many minutes the tool monitors for repeated logins, the maximum number of failed logins allowed and how long each IP ban stays in place.

 

Passwords

From your admin cPanel login to individual email accounts, every access point needs a strong, secure password. Longer passwords allow for more complex combinations of numbers, symbols and upper- and lower-case letters. Use a different password for accessing cPanel, FTP, email management and other secure areas, making sure none of them contain obvious information such as phone numbers or birthdays. If you have trouble coming up with enough different combinations, try an online password generator.

 

Automatic Updates

One of the easiest ways to keep cPanel secure is to enable automatic updates. Old versions of software, including cPanel, may contain security vulnerabilities hackers can use to access your server. Automatic updates ensure you’re always running the latest version of cPanel with any associated security patches and bug fixes. Go back and check once and a while to confirm updates are running as they should. If not, update manually and contact your web host to find out why the setting isn’t working.

 

Additional Settings to ‘Tweak’

While you’re taking care of the larger security issues in cPanel, make sure you don’t neglect less common settings. Open ‘Tweak Settings’ under Server Configuration to access an entire list of other possible security measures. With this checklist, you can:

• Help prevent the sending of unauthorized emails, including spam
• Shut down potential email attacks
• Block malicious referrals or redirects from hijacking your site
• Stop the generation of proxy domains
• Require IP validation for cookies
• Set up an additional security token for cPanel access

Enabling these additional cPanel security settings helps address any remaining vulnerabilities and keep hackers at bay. But, for those of you who feel there’s just not enough time in your day to employ these security measures, or if you just prefer someone else does it for you, at TurnKey Internet we got your back. We offer Fully Managed solutions that include Server Hardening. We’ll take care of securing and protecting your server and cPanel so you can focus on running your business.

For more information, visit https://turnkeyinternet.net/managed/

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 20th, 2017

Tagged with , , , , ,

Content Management System (CMS)   1 comment

Posted at Jun 13, 2017 @ 10:32am Web hosting

CMS - Content Management System

Whether you are a beginner looking to start your first website, or a tech-savvy business owner creating your company’s e-commerce store, one of the first decisions you will make is what Content Management System, or CMS, to use. A CMS is an application that supports the creation and publication of digital content and media. More importantly, a CMS allows creators with little knowledge of programming languages to easily create and manage websites and their content.

While there are various options when it comes to choosing a CMS, a few standout due to their popularity:

 

Drupal

Currently ranked the 3rd most popular CMS in the world, Drupal is considered as one of the most versatile, and robust systems available today. If you’re building a website that will contain a large amount of complex data, and expect to have heavy visitor traffic, Drupal is an excellent choice due to the speed and strength from its advanced structure. It also features a large amount of free themes and available add-ons. However, all of this comes at the cost of needing more experience and expertise to truly utilize this powerful, yet at times complex CMS. Drupal is enterprise-ready and will scale with your growing business.

 

Joomla

Next we have the 2nd most popular CMS, Joomla. When it comes to E-Commerce sites, Joomla tends to be a favorite choice for many. It’s based on PHP and MySQL, allowing more advanced developers to create powerful web applications. This has helped Joomla to build what’s considered to be one of the strongest developer communities around. With a minor amount of effort into learning Joomla’s terminology and structure, you can go on to create a fairly advanced website.

 

WordPress

Finally, we have by far the most popular CMS out there, WordPress. Back in 2003, WordPress started out as just a simple blogging tool. Today, it has grown into a full, feature-rich, content management system, that is currently running on more than 75 million websites. With it’s extremely easy to use interface, you can create a website in only a matter of minutes. Plus, with the endless amount of free themes and plugins available for WordPress, it’s easy to make your website look great. However, popularity does have it’s drawbacks. For instance, WordPress is one of the biggest targets for hackers. It is critical you keep it up-to-date to prevent attacks on your website. Regardless, with it’s intuitive design and countless number of free customizations, this easy to manage CMS demonstrates why it’s a popular choice.

 

All three CMS applications listed above have their own pros and cons, but a benefit they all share is that they are free to use, open-source software. Plus to make things even easier, they all support simple one-click installations. Need help getting started? At TurnKey Internet, our Cloud Solution Specialists are here to assist. Contact us today!

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 13th, 2017

Tagged with , , , ,

Web Hosting 101: What is a VPS?   1 comment

Posted at Jun 6, 2017 @ 10:18am Web hosting

What is a VPS?

Businesses are faced with a wide variety of choices and options when it comes to finding a hosting solution for their website, company email and data. One option is shared hosting, in which a single server’s resources are shared by a number of different websites and users. However, if you’re a business looking for more power, control, and flexibility, the solution for you may be a VPS or Virtual Private Server. A VPS offers the ultimate combination of performance, value, security and are far more flexible than other hosting options, giving your organization full control over the security settings, choice of operating system, control panels, software configuration, and applications.

Let’s take a look at some specific advantages of choosing a VPS:

 

Guaranteed Resources

When using a VPS, your server is provisioned with a specified amount of performance resources that is exclusive and guaranteed to you and no one else. Not only will this give your business more room to work with and expand, it will also prevent issues with your site caused by other websites. For example, if you’re site is hosted on a shared server where there is another website that is being attacked or hogging up resources, this can affect the performance of your own company’s website.

 

Customized Performance & Software

A VPS allows your business to customize performance and software based on your company’s unique needs. Things like CPU Cores, Memory, and Hard Drive space can all be customized and upgraded on a VPS. With shared hosting, you are limited to the software already installed on the server, and sometimes it may lack a requirement or feature your business needs. But with a VPS, you have full flexibility over which software the server runs, even down to the Operating System.

 

Administrative Access

One downside of shared hosting solution is the lack of Administrative or root access. This limitation affects what software you can install as well as the settings and options that you can configure. This can greatly impact the potential of what you are able to do with your website. However with a VPS, you do have root/admin access to your virtual server. This advantage will also provide you with the ability to better monitor and troubleshoot your website because you’ll have full access to your virtual server’s logs.

 

Dedicated IP Address

Each VPS comes with its own dedicated IP address. With shared hosting, your site may be sharing an IP address with multiple websites. If your website happens to share an IP with a site that spams or contains malware, this can cause multiple problems. Your website can end up getting blocked, your email rejected as spam, even your search results can be affected. Another thing to consider is whether or not you’ll be running e-commerce software or selling things on your site. If so, you will need to have an SSL for your site, which in turn requires a unique dedicated IP.

 

Now if you’re worried that you’re not tech savvy enough to run your own VPS, consider the option of going with a Managed VPS solution, which will provide many additional benefits on top of what’s listed above. There are countless other advantages to using a VPS, however the 4 above are some of the most notable. So before you decide to host your website on a shared server, consider the added flexibility, reliability, and performance that a VPS can provide.

Backed with bulletproof reliability, TurnKey Internet’s virtual private servers offer the perfect balance of value, performance, and ease-of-use. All VPS packages include 100% network up-time, 24/7 support, and a 30-day money-back guarantee! Turnkey Internet offers a full suite of managed hosting services such as server back-ups, hands-on system administration, intrusion detection protection, and advanced firewall protection services. Select from Linux or Windows operating systems. Choose control panel software from cPanel, Plesk and DirectAdmin. For more information, visit www.turnkeyinternet.net

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on June 6th, 2017

Tagged with , , ,

Why Website Speed Matters (Infographic)   no comments

Posted at May 23, 2017 @ 9:36am Web hosting

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

View Full Size

Why Website Speed Matters - Infographic

View Full Size

Click Here to see just how fast your website can be with TurnKey Internet! – FIRST MONTH FREE!

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 23rd, 2017

Tagged with , ,

Shared Hosting vs Dedicated Server   no comments

Posted at May 9, 2017 @ 10:09am Web hosting

Shared Hosting vs Dedicated Server

When you are just getting started, a shared web hosting plan is typically enough to help you meet your goals. It gives you a platform to collect leads, showcase your company and sell your products and services. The problem with shared hosting, though, is that it comes with limited performance and limited room for growth. Although it’s enough while your business is still small, you might want to think about upgrading as your business starts to grow. Many people have a hard time deciding when to make the switch, and if you can relate to this problem, then the following information will get you started in the right direction. You will learn about the benefits of using a dedicated server, but you will also get a clear picture of when to take action.

 

With most shared hosting plans, your performance can be impacted by the way that other people on the server use their resources. If someone else’s website is getting a lot of traffic or being attacked, then your website might slow down or even go offline for a while. If you depend on your site to generate sales, then this downtime is unacceptable. When your customers want to make a purchase, they are not always going to wait for your content to come online again. So any performance issues that you experience can hurt your profitability. A dedicated server will help you avoid that problem by providing you with exclusive resources. A dedicated server also enables your business to customize and configure the performance resources and software based on your company’s unique needs. Things like CPUs, memory, and storage space, can all be customized and upgraded on a dedicated server. With shared hosting, you are limited to the software already installed on the server, and sometimes it may lack a requirement or feature your business needs. But with a dedicated server, you have full flexibility over which software your server runs, even down to the Operating System (Windows, Linux, etc).

 

Another downside of shared hosting is the lack of Administrative or root access to the server. This limitation affects what software you can install as well as the settings and options that you can configure on the server. This can greatly impact the potential of what you are able to do with your website. However with a dedicated server, you do have full root or admin access, giving you the ability to better monitor and troubleshoot your website, with full access to your virtual server’s logs. With a dedicated server, you have exclusive access and can dictate who shares that access. This allows you to better secure the contents on your server and alleviates the concerns of sharing a server with malicious or careless users. Also because you have full control over the server, you can better enhance and customize its security based on your unique needs.

 

If you have decided that you need to upgrade, then consider it a good thing. Needing more resources means that your business is growing and that you are attracting plenty of new customers. Having a dedicated server will help you accommodate even more web traffic, and you will not need to worry about losing sales or customers due to downtime. The speed and performance of a dedicated server will also help you maintain a professional image, which will enhance and preserve your reputation. Some business owners procrastinate when they need to upgrade their website, but doing so hurts them more than they likely suspect. Ensuring that your web hosting solution is capable of meeting your needs is a vital factor when it comes to getting the most from your business, and you can get started right away.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 9th, 2017

Tagged with , , ,

What is a Dedicated Server?   no comments

Posted at May 2, 2017 @ 11:00am Web hosting

What is a Dedicated Server?

A dedicated server (also known as a bare metal server) offers the ultimate combination of performance, value and security for your web hosting needs. A dedicated server provides you with exclusive access to all the physical hardware in the server (CPU, Ram, Disk, Network Port, and the physical chassis of the server). Nothing on the server is shared with any other clients in any fashion.

For most clients with a new website or business, a Shared Hosting solution is enough to get off the ground. But, for many there comes a point when shared hosting just isn’t enough. The most obvious sign that it’s time for an upgrade is when your website has started regularly requiring more bandwidth or resources than your current plan provides. If your business increases in popularity, thus suddenly sending more visitors to your website, it could temporarily go offline. However, upgrading your shared hosting to a dedicated server can prevent this.

Regardless of the content of your website, if you’re worried about stability, a dedicated server is always the safest bet. Below you will find a summary of all the benefits a dedicated server provides.

 

Performance

Server and network response times in a shared hosting environment depend highly on the activity of other users and websites with whom you share space and resources. With a dedicated server you have significantly faster response and page load times because all the systems resources (such as CPU, disk, RAM and network bandwidth) are controlled and utilized solely by the applications on your server.

 

Reliability

With a dedicated server, you have unlimited access to the operating system, server resources and software applications. This gives you a reliable way to manage the needs of your website and users: it’s all there when you need it.

 

Security

Dedicated servers provide better security than any other form of hosting since you are the only one with the root “administrative” access to your resources and can configure customized security policies, such as firewall protection, user-level permissions and even restrict the types of applications that run on the server. With shared hosting, the users you share space with could jeopardize the security of your website and data.

 

Customization

Dedicated servers offer unlimited customization and flexibility to meet your hosting application needs. You have access to fine tune and optimize all aspects of the server such as custom versions of Apache, PHP, MySQL, or custom database configurations to suit your application needs, providing substantial performance gains over any other form of hosting. You can install, remove, or modify any applications you wish.

 

Dedicated servers are the best solution for those that are serious about their web site and want the assurance that hardware, software and resources are dedicated exclusively to them. If you are considering hosting numerous domains, a high traffic site, an e-commerce site, have sensitive data contained in your site or simply want more speed, power and control, it’s time to upgrade to a dedicated server.

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on May 2nd, 2017

Tagged with , ,

Does Your Small Business Really Need A Website?   no comments

Posted at Apr 25, 2017 @ 10:54am Small Business,Web hosting

If you run your own small business, you may find yourself asking the question “Does my business really need a website? Isn’t Facebook really my website these days?” Facebook and other social media platforms like LinkedIn, and Twitter, all give you a little space to publish your message. Think of it as a small billboard that you get for free. However, if you want to provide a branded and interactive experience that drives business to you, having your own website is crucial.

Think you don’t need a website because you just have local clients who come to your shop? You can get even more local clients aware of your business by having a website, combined with using social media. For instance, having your own website lets you setup email news letters (so you can re-announce to your current clients to come back in during promotional periods), as well as sell direct to people outside your region. Even if you are a local retailer, focused on walk in sales only, a website won’t hurt you, it will only help promote more people to come in and check you out!

The first step in starting a website for your business is finding a web hosting solution. Web hosting is a type of service that allows individuals or organizations to make their website visible on the internet. This can vary greatly from a simple static web page to a truly interactive video rich experience that drives sales through an online e-commerce shopping cart. Web hosting companies provide dedicated servers or shared space on a server for clients that are housed in an internet connected datacenter. Web hosts can also provide datacenter space and connectivity for other advanced needs beyond just website hosting, such as an office’s central file server, mail server, or even virtual desktops. Web hosting is also commonly referred to as “Cloud Hosting”, or “The Cloud” since your website resides out on the internet, allowing anyone to access the information you want publicized.

Your Web Hosting Provider’s job is to keep your website always online, secure, and fast so that your potential and current clients continue to find and shop with you, and not your competitor. Selecting a reliable Web Hosting Provider is crucial because when you site is down, people cannot get information or make purchases. Every minute your website is down impacts your reputation and could mean losing a potential customer or make your business appear unreliable. Choosing the right Web Hosting provider to fit your business needs can seem to be a large task with all the vendors and options on the market today, but don’t fear, TurnKey Internet has got you covered.

If you are serious about your business, you plan to grow, and picking TurnKey Internet as your Web Hosting partner provides you future growth ready flexibility. TurnKey Internet offers a wide range of cost effective cloud service options and platforms to get your business online. From value-priced Web Hosting Plans, Virtual Private Servers, Dedicated Servers, Managed Servers to Secure Colocation Services, TurnKey Internet can meet your cloud-based needs from one small virtual server, up to hundreds of dedicated servers. The foundation and core of TurnKey Internet is structured for lighting speed and rapid growth through our company-owned network and datacenter.

The question should no longer be “Does my business really need a website?” But rather “Why did I wait so long to start?”

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on April 25th, 2017

Tagged with , , , ,

Effective Security Measures For Your Server   no comments

Posted at Apr 4, 2017 @ 10:49am Web hosting

If you run a server, especially for your business or organization, security should be a top priority. Whether the server exists to host files for a website or is networking computers for an office, it needs to be protected from malicious software, exploits and hackers. Failing to secure a server can lead to lost or corrupted data, damage to devices connected to the network and unauthorized individuals getting access to sensitive data. Below are various security measures that you can employ on your server that are extremely effective.

 

Review & Modify Default Settings

Programs running on your server, such as control panels (cPanel, Plesk), CMS (WordPress, Joomla, etc.) and even the operating system, contain various default settings  that need to be reviewed and if necessary modified. They include everything from preset usernames and passwords for admin access to default connection ports. Anything that is left as set up by the software manufacturer may be used as a way to gain easier access to a system. Even leaving the URL for admin access to a server or programs on the server can make it easier for hackers to get in. There are hacking tools that specifically scan websites and servers for default URLs and folders, so changing default login locations is important. On this same basis, it’s a good idea to make sure that directories are protected so that people cannot see their contents.

 

Active Monitoring

A critical requirement to properly managing a server is knowing what is happening with it at all times. Even the best security software cannot prevent all intrusions, and hackers are constantly figuring out new ways to exploit and circumvent security systems. Therefore, it’s important that activity on a server is always being monitored. Things that normally indicate a problem include incredibly high data transfer or processing power use as well as multiple failed login attempts. Brute force hacking involves trying to login to a system over and over again with different login and password combinations. In addition to draining system resources, it can also eventually allow a hacker to find a combination that lets them into your system. Real-time monitoring can help detect these issues and alert the appropriate people, and it can also shut down brute force login attempts.

 

Passwords & Permissions

Another important server security measure is to ensure that all passwords, especially the root and/or Admin passwords, are complex and that people are only given access to areas that they need to do their job. Aside from malice, giving an intern administrative access to databases could lead to major problems through simple error. It’s also recommended to change your passwords on a regular basis, even if they are robust.

There are a number of ways to tackle the issue of making sure passwords are complex enough, including using computer generated passwords or using passphrases. Computer generated passwords normally require certain characters, length and require a combination of upper and lower case letters; passphrases are combinations of words, and they tend to be easier to remember and more secure than passwords. There should also be a set time that passwords expire, which will require users on the network to change them on a regular basis.

Along with ensuring that people are only given access to parts of a server that they need to have, it’s important that permissions are updated when people leave a job or move to a different part of the company. This can be done with proper database management and doing occasional audits to ensure that access levels are appropriate.

 

Updates

One way that hackers get into many servers is by going through weak points that developers did not notice when creating an application or an operating system. This is why both computers and mobile devices need regular updates. Along with offering new options, updates close off back doors and holes in the security of software. Therefore, it’s important that all software hosted on your server is kept up to date. For web hosting servers, that means content management systems (CMS) and the plug-ins the CMS uses must be kept current. Many operating systems and software applications can be set up to update automatically, but if you’re not comfortable with that, it’s important that you have some way of being notified when important changes are available.

 

For those of you who feel there’s just not enough time in your day to employ these server security measures, or if you just prefer someone else does it for you, at TurnKey Internet we got your back. We offer Fully Managed solutions that include Server Hardening. We’ll take care of securing and protecting your server so you can focus on running your business. For more information, visit https://turnkeyinternet.net/managed/

 

 

Share : Facebooktwitterredditlinkedinmail Follow Us : Facebooktwitterlinkedinyoutubeinstagram

Written by David Maurer on April 4th, 2017

Tagged with , , , , ,