Online security is essential for everyone
When thinking of your online security, the first things you think about are probably credit card data, or financial information. Maybe you think of someone reading your e-mails. But did you know that even something as simple as your name or phone number can have significant value to cybercriminals? These small pieces of data, when harvested in large quantities, can be sold for good money. Another possible problem might be that your web domain could be hijacked and used in cyberattacks… and you wouldn’t even know about it.
This makes good security a very important condition for anything you do online. With the importance of data growing every day… you don’t want yours falling into the wrong hands. Leaving your data online – even in a secure environment – can be scary. That’s why we’ll tell you exactly which security measures you can expect from PCextreme.
PCextreme uses servers to store your data. Much like a fortress has multiple gates, there are many ways to gain access to a server. And like fortress gates need strong and watchful guards, so do servers need sturdy protection against all kinds of attacks. Let’s have a look at how PCextreme secures the entrances to its servers.
Security measures PCextreme uses
- Most of PCextreme’s webservers run on CentOS, a system that has excellent integration with SELinux (Security Enhanced Linux). SELinux makes sure that all our clients’ web domains are shielded off from one another. This way when something happens with one domain, it doesn’t affect any of the others nor does it impact our service.
- A common security issue are outdated PHP scripts. When support expires, the security of your domain can be compromised. We counter-act this with PHP-FPM, which allows us to run multiple PHP versions on the same system. If support on one expires, we can easily change versions for customers and swap out the old ones.
- PCextreme has firewalls around all hosts. These automatically detect when there are multiple failed login attempts, at which point we can block access. We can also use firewalls to allow or disallow certain programs or IP addresses to connect to the server. This is determined by rulesets that our system administrators develop, using their years of experience.
- We have a caching load balancer set up between the internet and our servers. It helps take some of the workload off the actual servers, but next to that it’s also a security measure that forms a first line of defense. For example, if a specific network is found that is attacking WordPress websites, we can block them before the request even shows up on our own servers.
- We make backups four times a day, using a program called Bacula. In case of a truly catastrophic event, we can always fall back on these backups, which are kept for at least 7 days. These backups are only called upon in case of emergency.
- Last but not least, we use Zabbix to permanently monitor all our services. We have an on-call system administrator who is automatically alerted when things aren’t responding in the correct or expected way.
So what if I don’t need security to be this tight?
Even if you’re not dealing with bank details or storing important data, security is very important. Every day thousands of websites are defaced by internet graffiti artists: hackers who are only interested in defacing your website for fun. Your website might be a target just because it has a certain word in the title or on one page. Or you could be caught up in a bigger attack on someone else’s website. In short, without proper security you’re putting your data in harm’s way… important or not!
PCextreme’s expertise is here to keep you safe
Next to these six factors of security, there is of course our human factor: PCextreme’s team of trained webhosting professionals know exactly how to defend your data. We work together every day to make sure our hosting solutions are some of the most secure on the market.
Would you like to know more? Read more on our website or contact us.