Avoid Software that Does Not Receive Updates: If your site relies on software that no longer receives regular development and security updates, it may be vulnerable to compromise. If you no longer need the script, it is best to download your backups and remove it from the server. These tend to be forgotten, and since they are no longer maintained, they are often out of date and can pose a very serious security threat on your account. The first number can be one of these, but not either of the last two numbers.) Never leave scripts on your account that are not being used. (That's anything ending in 7, 6, 3, or 2. Most users know to avoid 777 permissions, but you really want to avoid any permission settings which allow Group and World writing. The correct permissions are normally 755 or 644, and you can check these in your File Manager. Always upgrade to the latest version available. New versions of software like WordPress and other scripts and tools that are used on your server include security updates to prevent known and easily exploited vulnerabilities. Websites & Software In addition to actions you can take when selecting and using passwords to log into your services, there are actions you can take with your websites to prevent malicious access: Update Your Software: Always upgrade to the latest version of your blog, forum, shopping cart, etc. Any method you use to log into your services should be secured or limited to use on private networks. Note: This includes accounts that you log into through web browsers, email programs such as Outlook or Thunderbird, and even instant messenger clients and games. Use Strong Passwords: Do Not Use Unsecured Connections on Open or Public WiFi: Always be careful to only use SSL encrypted connections whenever possible, as unsecure connections on public networks can reveal your passwords to malicious users who are monitoring network traffic. Note: If you NEED to provide access to another person, generate a temporary password to provide to them, rather than providing the password you use regularly and restore your previous password when they no longer need access.ĭo Not Write Passwords Down: Alternatively, use a service which may allow you to securely store all of your passwords, generate random passwords, and even provide reminders when a password needs to be updated. Even if you use a strong password, with many random characters, if it becomes compromised it will be tested by competent hackers trying to brute force your passwords. ![]() Keep Your Password Secret: Any time a password is compromised it may be added to large databases of common passwords. ![]() Be sure to type in the name of the secure service you wish to access in the address bar of your browser to help prevent getting your login password stolen. Please do not login to any account via an unknown link. Phishing attacks are becoming a common way to steal login passwords. Never use a secure service on a computer that you are not familiar with and which has not been scanned with an antivirus program. Software that logs your keystrokes, or reports information that you've sent can be used as a powerful tool against you. To help prevent your services from being compromised:ĭo Not Connect to Your Services from Computers that are Not Secure: By logging into your services using computers that may be compromised, it is possible to capture your password as it is used, circumventing the need to guess it or crack it. There are many common methods for attack that hackers may use to compromise your services.īy using the following recommendations, not only will your hosting be more secure, but many other secure services you work with will be as well.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |