TAG
Security
Find top security content designed to inform business owners and developers on how to keep infrastructure up and running - no matter what threats come your way.
Linux Scope of Support
Find out exactly what Liquid Web covers and what the customer is responsible for on Linux Servers in this Scope of Support.
Tagged with: backups, beyond scope of support, beyond scope support, bulletproof security, core managed, data security, database management, development, fully managed, linux, migration, Migrations, Scope of Support, Security, self managed, Website Domain
Continue ReadingWindows Scope of Support
Liquid Web provides exceptional support for our Windows solutions, including our Heroic Promise, and Beyond Scope Support.
Tagged with: around the clock support, backups, bulletproof security, cloud backups, cloud security, core managed, customer support, cybersecurity, data security, development, fully managed, Migrations, online security, plesk, Scope of Support, Security, self managed, site migration, Support Team, web hosting support services, website migration, Windows
Continue Reading5 Security Questions You Need to Ask Your Cloud Hosting Provider
Looking for a secure host but not sure what makes them secure? Here are five security questions to ask your potential cloud hosting provider.
Tagged with: big data, breach, bulletproof security, cloud security, customer data, cyber attack, cyber security, cybersecurity, data center, data loss, data privacy, data protection, data security, database, database hosting, healthcare security, HIPAA, hipaa compliance, online security, Security
Continue ReadingLiquid Web Announces Protection and Remediation Services for their Managed Hosting Solutions
Liquid Web announces new Protection and Remediation Services to further help safeguard customers from cyber attacks and address compliance requirements.
Tagged with: antivirus, bulletproof security, data loss, data protection, data security, firewall, firewalls, importance of data backup, online security, Phishing protection, press release, Ransomeware, Ransomware Protection, Security, security attack, security exploit, security risks
Continue Reading6 Options for SSL Certificates to Secure Your Website
Ensure you gain trust with your website visitors right away with an SSL certificate. Find out the different SSL certificate types and their features.
Continue ReadingWhat is Cloud Private Network?
What is the difference between a private network and a cloud private network? Learn more about the differences and which option works best for your needs.
Continue ReadingTen Questions You Need to Answer to Survive a Data Disaster
There are ways to safeguard your business from data loss, technological failure and more. Here are ten questions you need to ask to survive a data disaster.
Continue Reading7 Steps Every Organization Should Take to Protect Against Security Breaches
There a number of things that organizations can do to better secure their infrastructure protect against security breaches.
Tagged with: automated backups, brute force, brute force attack, brute force detection, cloud backups, cloud security, continuous backups, data protection, data security, guardian backups, Off-Site Backups, online security, password manager, Security, security attack, security risks, server backup, strong passwords
Continue ReadingData Privacy Day Is Your Opportunity to Put Privacy in the Spotlight
Data Privacy Day is an opportunity to put privacy and security at the top of your agenda. These are ideas for improving your company’s privacy protections.
Continue ReadingHere Is What You Need to Know About Meltdown and Spectre
Earlier this week, multiple vulnerabilities were released that affect nearly every modern server. These are being known by as Meltdown and “Spectre.
Tagged with: Security
Continue Reading