Press Release: Liquid Web Outperforms Competition Across Web Hosting and Cloud Service Platforms Delivering Faster, Better User Experiences

Liquid Web’s Server-Side Performance Tops Amazon, Rackspace and DigitalOcean

LANSING, Mich. – May 17, 2017 – A study by performance analyst firm Cloud Spectator finds that Liquid Web LLC, a $100 million managed hosting provider, beats rivals Amazon, Rackspace and DigitalOcean when it comes to website and cloud application performance. Liquid Web’s virtual machines (VMs) exhibit faster processing and disk speeds, while performing more transactions and sustaining more requests per second.
Continue reading “Press Release: Liquid Web Outperforms Competition Across Web Hosting and Cloud Service Platforms Delivering Faster, Better User Experiences”

CEO Jim Geiger on the Impact of Web Hosting on Small Businesses

No matter the size of your business, having a strong web presence is necessary. That sentiment was repeated by nearly 80% of small and medium business owners in our recent study – and that makes choosing your web host even more critical. Liquid Web’s CEO, Jim Geiger, recently wrote an article for SmallBizTechnology.com that discussed the most important factors small and medium-sized businesses should take into account when choosing a web host.

“With an increasing number of businesses betting their success on their web presence and cloud reliant technologies, it is troubling to see the percentage that make this critical business decision based on price alone,” Geiger explained. “It can be a costly mistake, especially for businesses that can’t afford downtime, slow site performance or security breaches.”

Continue reading “CEO Jim Geiger on the Impact of Web Hosting on Small Businesses”

Modern Enterprise Networks Are Larger Than Ever – Here’s How You Can Keep Yours Secure

Modern Enterprise Networks Are Larger Than Ever - Here's How You Can Keep Yours Secure
In the past, it was very clear what you meant when talking about a business’s corporate network. A few servers and PCs, a laptop or two, maybe a VOIP solution, all protected by a firewall. Remote work, where it existed, was relatively rare, and subject to heavy authentication.

Then the smartphone was born. Continue reading “Modern Enterprise Networks Are Larger Than Ever – Here’s How You Can Keep Yours Secure”

Three New Attack Vectors That Will Be Born Out Of IoT

Three New Attack Vectors That Will Be Born Out Of IoT
Everything from your first cup of coffee & your commute to the office, to your afternoon snack & evening walk with your dog can now be connected and tracked. This is the kind of world we will soon live in – a world where every device or appliance we use in our day-to-day is connected to the Internet. Because of how widespread it has the potential to become, the Internet of Things could easily transform how we live, work, and play. The possibilities are limitless. … Unfortunately, so are the security risks. Continue reading “Three New Attack Vectors That Will Be Born Out Of IoT”

Press Release: ‘We’re Not Done Yet’: Liquid Web Brings Innovation Back to Managed WordPress Hosting

New visual comparison tool and automatic SSL address customer needs and pain points

LANSING, Mich. – April 18, 2017 – Liquid Web, a $100 million managed hosting provider focused on web-dependent professionals, brings innovation back to the world of managed WordPress hosting with the addition of a new visual comparison tool, automatic SSL and other capabilities expected to benefit customers. Continue reading “Press Release: ‘We’re Not Done Yet’: Liquid Web Brings Innovation Back to Managed WordPress Hosting”

Three Ways DDoS Attacks Are Evolving In 2017

Three Ways DDoS Attacks Are Evolving in 2017
The distributed denial of service attack is one of the oldest criminal activities on the web, a distinction it shares with ransomware. In spite of its age, however, DDoS attacks have weathered the years surprisingly well .The reason for that is quite simple – even though at its core, every DDoS attack does the same thing (overwhelms a target with fraudulent requests), DDoS attacks as a whole have evolved significantly over the past decades.

And 2017 saw some of the most significant evolutions yet. Continue reading “Three Ways DDoS Attacks Are Evolving In 2017”

The Truth About DDoS Attacks

The Truth About DDoS AttacksIt starts with a bit of unusual traffic – a surge of access requests from seemingly-unrelated IPs. Slowly but surely, your servers are overwhelmed. Your network-facing infrastructure starts slowing down, until it eventually grinds to a halt altogether. With a sinking feeling in the pit of your stomach, you realize what this means. You have been targeted by a distributed denial of service attack. And until such time as the attacker decides you are no longer a worthwhile target, all you can do is weather the storm. Continue reading “The Truth About DDoS Attacks”

Your Employees Are Working Remotely. Is Your Business Protected?

Your Employees Are Working Remotely. Is Your Business Protected?According to International Data Corporation (IDC), just three years from now mobile workers will make up almost 75% of the U.S. workforce. To anyone who has been paying attention, this should come as no surprise. It is increasingly rare to see anyone without a smartphone in this day and age – and just as rare to meet someone who has not used that device for working remotely on at least one occasion.

You have doubtless heard all the rhetoric by now. Mobile devices are to remote productivity what the automobile was to transportation. Thanks to smartphones and tablets, the time an employee spends on the train or in line at lunch is no longer wasted. Now, it can be spent dialing in to meetings, connecting with colleagues over corporate instant messaging, or replying to emails. With the right applications, it can even be spent editing documents.

It sounds incredible, right? There’s just one catch: security. While the fact that employees can connect from anywhere is a great strength of mobility, it is also its greatest weakness from a security standpoint. Continue reading “Your Employees Are Working Remotely. Is Your Business Protected?”

Backing Up Your Data is the First Step to Disaster Proofing Your Business

Backing Up Your Data is the First Step to Disaster Proofing Your BusinessHappy World Backup Day! On this day we’d like to take today to remind everyone why off-site backups are the best way to protect your mission-critical data. If something catastrophic occurs – whether it is a ransomware attack, a natural disaster, or simply a hardware failure – you do not want to lose anything essential. But you should also think a little more critically about your plan if disaster strikes. If you truly want to disaster-proof your organization, then you need to make sure you think of the following:
Continue reading “Backing Up Your Data is the First Step to Disaster Proofing Your Business”

Worst Case Scenario: Here’s What Can Happen If You Fail To Maintain A Backup

Worst Case Scenario: Here’s What Can Happen If You Fail To Maintain A Backup
Recently, a community site known as Myth Weavers suffered a catastrophic database failure. The site, which stores information for a variety of different board games, is – or perhaps I should say, was – widely-used in the tabletop community. Unfortunately, earlier this month, a routine prune by the site’s administrator went horribly wrong. Continue reading “Worst Case Scenario: Here’s What Can Happen If You Fail To Maintain A Backup”