TAG
data security
Breaking Down HIPAA and HITECH Compliant Hosting
The HITECH Act is less well known than HIPAA, but is just as important. A HITECH compliance certified host will fulfill requirements and keep data safe.
Tagged with: Compliance, compliant hosting, compliant hosting responsibilities, data breach, data privacy, data privacy act, data security, HIPAA, HIPAA and HITECH compliance, HIPAA and HITECH compliant hosting, hipaa compliance, HIPAA violation, HITECH compliance, HITECH hosting compliant, HITECH violation, securing ePHI data
Continue ReadingSix Best Practices for Secure Remote Access
Businesses and freelancers that employ remote access for their employees using a VPN can reap many benefits, but there are risks. So what is remote access?
Tagged with: cloud security, cyber security, data security, ddos, firewall, online security, passwords, remote, remote access, remote access key, remote backup solutions, remote employee, remote employees, remote workforce, secure access for remote employees, secure remote access, Security, security attack, security exploit, security risks, security tips, strong passwords, update software, virtual private network, vpn, web security
Continue ReadingUnderstanding Content Delivery Networks (CDN)
What is a Content Delivery Network, also known as a CDN and how does it help your website? CDNs are extremely helpful for sites with a global audience.
Tagged with: cache, cached content, CDN, cloudflare, cloudflare CDN, content delivery network, content delivery network node, content delivery network service, content delivery networks, content downloads, cybersecurity, data protection, data security, interactive content, online security, secure sockets layer, Security, security attack, security exploit, security risks, serving content globally, speed, speed up WordPress, speed up your site, SSL, SSL Certificate, SSL Certificates, static content, what is a cdn, WordPress security tips
Continue ReadingLinux Scope of Support
Find out exactly what Liquid Web covers and what the customer is responsible for on Linux Servers in this Scope of Support.
Tagged with: backups, beyond scope of support, beyond scope support, bulletproof security, core managed, data security, database management, development, fully managed, linux, migration, Migrations, Scope of Support, Security, self managed, Website Domain
Continue ReadingWindows Scope of Support
Liquid Web provides exceptional support for our Windows solutions, including our Heroic Promise, and Beyond Scope Support.
Tagged with: around the clock support, backups, bulletproof security, cloud backups, cloud security, core managed, customer support, cybersecurity, data security, development, fully managed, Migrations, online security, plesk, Scope of Support, Security, self managed, site migration, Support Team, web hosting support services, website migration, Windows
Continue Reading5 Security Questions You Need to Ask Your Cloud Hosting Provider
Looking for a secure host but not sure what makes them secure? Here are five security questions to ask your potential cloud hosting provider.
Tagged with: big data, breach, bulletproof security, cloud security, customer data, cyber attack, cyber security, cybersecurity, data center, data loss, data privacy, data protection, data security, database, database hosting, healthcare security, HIPAA, hipaa compliance, online security, Security
Continue ReadingLiquid Web Announces Protection and Remediation Services for their Managed Hosting Solutions
Liquid Web announces new Protection and Remediation Services to further help safeguard customers from cyber attacks and address compliance requirements.
Tagged with: antivirus, bulletproof security, data loss, data protection, data security, firewall, firewalls, importance of data backup, online security, Phishing protection, press release, Ransomeware, Ransomware Protection, Security, security attack, security exploit, security risks
Continue ReadingWhen to Transition to Cloud-based Data Centers
With today's security threats and demands on infrastructure increasing, leaders need to have a firm grasp on when to transition to cloud-based data centers.
Tagged with: Cloud, cloud computing, Cloud Hosting, cloud security, Cloud Server, cyber security, data center, data loss, data security, migration, secure
Continue Reading7 Steps Every Organization Should Take to Protect Against Security Breaches
There a number of things that organizations can do to better secure their infrastructure protect against security breaches.
Tagged with: automated backups, brute force, brute force attack, brute force detection, cloud backups, cloud security, continuous backups, data protection, data security, guardian backups, Off-Site Backups, online security, password manager, Security, security attack, security risks, server backup, strong passwords
Continue ReadingPrevention vs. Protection: How Should You Mitigate DDoS Attacks Against Your Server?
DDoS, or Distributed Denial of Service attacks, are more commonplace than ever with the rise of Internet of Things. Find out ways to prevent DDoS attacks.
Tagged with: cloud security, cybersecurity, data disaster, data recovery, data security, ddos, distributed denial of service, malicious attacks, suspicious activity
Continue Reading