PCI Compliant Web Hosting and Managed Service Provider
Hosting Solutions since 1995

How often should I log into WordPress

Author: ; Published: Nov 19, 2012; Category: Managed Hosting, WordPress; Tags: ; No Comments

Over the past several years of working with small business owners and WordPress, we are often asked, “How often should I log into WordPress?” or related statements that begs the question.

Let me share with you some reasons as to why you should be logging into your WordPress content management system — CMS — or blog as often during the week as you are able to practically do so.

Lessons learned from an Internet outage

Author: ; Published: Nov 12, 2012; Category: Customer Support, Managed Hosting, Reseller Hosting, Small Business; Tags: ; No Comments

The moral of this story raises the question… what’s your plan B for when there’s no Internet when you need it?

Learning from Storm Sandy

Author: ; Published: Nov 5, 2012; Category: Customer Support, Small Business; Tags: ; No Comments

Even though our servers are in secure, reliable, relatively hurricane resistant data centers and we have daily backup of all systems, we did not find out our weak areas until storm Sandy came into our neck of the woods.

Hacker Attack Vectors

Author: ; Published: Oct 29, 2012; Category: Managed Hosting, Managed Services, PCI Compliance, Security, Small Business; Tags: , ; No Comments

Repeat after me, “hackers most often target vulnerabilities, not specific people or companies.” Now, say that over and over again.. and shortly you should come to the conclusion that every single device and application typically has vulnerabilities which makes everyone a target. That’s right, everyone is a potential target — not just the big names,…

Customer Service 101 Relationships > Being Correct

Author: ; Published: Oct 22, 2012; Category: Customer Support, Managed Hosting, Managed Services, Reseller Hosting, Small Business; Tags: ; One Comment

Most small business stewards provide customer service as well as receive customer service as part of wearing many hats. I really appreciate being on both ends of giving and receiving as each encounter is an opportunity to learn, to adapt, to change, and to improve. Part of that picture is hearing and seeing something you…

WordPress Brute Force Attacks

Author: ; Published: Oct 15, 2012; Category: Managed Hosting, Security, WordPress; Tags: , , ; 7 Comments

If you asked me from September 2012 forward, the answer would change dramatically with WordPress Brute Force Attacks now exceeding 50% of all attacks being reported.

If you review your or your hosting provider reviews your web site’s access logs on a regular basis, you can tell if there are Brute Force attacks being attempted on your WordPress site by seeing multiple requests to access the file wp-login.php from the same IP address over and over again. Sometimes it might be a single request every x period of time; other times it might be scores of requests from the same IP address. By the way, are you or your provider regularly checking your web site access logs for abuse?

How can you protect yourself against WordPress Brute Force attacks?

Shared, VPS, Dedicated, or Cloud

Author: ; Published: Oct 8, 2012; Category: Managed Hosting, PCI Compliance, Security, Small Business; Tags: ; No Comments

How do you know what type of hosting — cloud, dedicated, shared, or vps — will fit you best?

Let me share some guidelines.

Cheap vs. Quality Hosting

Author: ; Published: Oct 1, 2012; Category: Managed Hosting, Small Business; Tags: ; No Comments

A short while back I was reflecting on ways to share what high value, high quality hosting looks like to the customer. Can that picture be expanded?

What are some key points between a cheap (aka budget or commodity) provider and a quality (aka premium) provider?

Extending Linux Socket Monitor

Author: ; Published: Sep 28, 2012; Category: Managed Hosting, Managed Services, Security; Tags: , ; No Comments

Linux Socket Monitor by R-fx Networks is a good, automated, tool to let you know if an application is creating TCP and UDP sockets.

The caveat we’ve experienced over the years is that when you receive an LSM alert that might involve malicious malware or hacker activity on the server running LSM, you sometimes have milliseconds to log onto the server to hopefully catch the application opening sockets red handed. If you are delayed or the application just runs that fast, by the time you are on the server, the port closed and the application is now in hiding.

I often agree necessity is the mother of invention, and I would like to share what we’ve done to extend the Linux Socket Monitor (LSM) to provide running process information, not just the netstat lines.

DNS – The GPS of the Internet

Author: ; Published: Sep 24, 2012; Category: Managed Hosting, Managed Services, Security; Tags: ; 2 Comments

If the Internet is the super information highway, then what other analogies can we make?

SSL Beast and RC4-SHA

Author: ; Published: Sep 19, 2012; Category: Managed Hosting, Managed Services, PCI Compliance; Tags: , , , ; 3 Comments

What if your PCI Compliance authorized scanning vendor wants you to only allow RC4-SHA as a SSL CipherSuite in order to pass PCI Compliance against the SSL BEAST Attack? Here are the tested settings.

Web hosting questions you should ask

Author: ; Published: Sep 17, 2012; Category: Managed Hosting, Reseller Hosting, Small Business; Tags: ; 2 Comments

More and more Web designers, IT (LAN, WAN, computer networking, computer repair) companies, and SEO (search engine optimization and search engine marketing) firms are offering Web hosting services to supplement their income.

Barry Moltz, who works with SCORE and small businesses to get their businesses unstuck, and the author of several books including “Small Town Rules,” shared one of the rules all business owners should follow is make no assumptions; test everything.