https://blog.superhosting.bg/en/clean-up-hosting-7.html

Press enter to see results or esc to cancel.

Tag Archive For "security and protection in Internet"

Clean Up Your Hosting Account Regularly

26 August 2018

Day 7 - one step away from the secure web presence. This is the last step of the security week in our SuperBlog, but this does not mean we are about to stop providing you with tips and tricks for securing your web presence.

Use an Encrypted Connection

25 August 2018

Here comes the sixth post from our security sequence. Yesterday we told you more about the importance of having a reliable hosting partner for securing your web presence. Today we will focus on connections.

Choose a Reliable Hosting Partner

24 August 2018

Hosting is long not used as a synonym for disc space anymore. It is now your website's home! Approach choosing a home for your website just like when you choose a home for your family and take into consideration all the details. Do not compromise on anything!

Always Have a Backup Plan

23 August 2018

So we have arrived at the fourth step from the security week in our SuperBlog. We are three steps closer to a more secure web presence so let's make our next move! After reminding you to always update your available systems, plugins and themes while focusing on the importance of backups, today we are going to talk about backup and recovery options.

Always Update Your Systems, Themes and Plugins

22 August 2018

The security week in our SuperBlog is in full swing! Yesterday we told you what types of passwords you should AVOID and how to select a strong enough password. Today we continue with another easy hack for increasing your website's security. Step 3: Always Update Your Systems, Themes and Plugins.

Widespread CPU Security Flaw Just Announced and the Measures We Took

10 January 2018

An alert for massive security flaws in Intel, AMD and ARM processors that have been manufactured during the last 10 years was disclosed on January 3, 2018. This lead to describing two critical vulnerabilities - Spectre and Meltdown. In short: these vulnerabilities disclose the OS core's RAM and other processes to malicious programs that can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. All modern computers, servers, smartphones and tablets are affected.