AUTHOR
Jerry Vasquez
A self-professed pirate captain with two decades of leadership experience, Jerry has led teams from 60+ cooks and chefs to 16 networking engineers. He brings those years of experience to his current role as Product Manager at Liquid Web, focusing on networking and security products. When not working or sleeping, Jerry can usually be found eating and having a good conversation with good people.
What is a DDoS Attack? Definition and Examples
A distributed denial of service (DDoS) is an attack that can cause a network or server to be interrupted and unavailable to users. Learn all you need to know about DDoS attacks.
Continue ReadingA Complete Guide to Healthcare Cybersecurity
Find out how to achieve secure healthcare systems against cybersecurity threats of today and tomorrow in this comprehensive guide.
Continue ReadingHow to Protect Backups From Ransomware and Cyber Attack
With ransomware on the rise, more and more businesses are having to consider alternatives to ransom. Learn how to protect backups from ransomware.
Continue ReadingProtect Your Customers with this Data Privacy Checklist
How well does your organization handle data privacy? This checklist will tell you - and let you know what could use improvement.
Continue ReadingDebunking 4 Myths on Shared IP vs Dedicated IP Addresses
Shared IP gets a bad rap when it can be beneficial. We debunk four common IP myths surround shared IP vs dedicated IP addresses.
Tagged with: business, dedicated IP, email, Email reputation, shared IP, shared ip vs dedicated ip, shared vs. dedicated, SMB, WordPress
Continue ReadingWhy is it Beneficial to Have a Dedicated IP Address Vs. a Shared IP Address?
When deciding whether to make your clients dedicated vs shared IP addresses, consider your resources, reputation and the stability of your business.
Tagged with: client acquisition, client ip, client onboarding, client onboarding checklist, client onboarding process, dedicated hosting, dedicated ip address, ip, ip address, ip addresses, ip addressing, ipv4, ipv6, new clients, share ip, shared ip address
Continue ReadingWhat is DDoS Mitigation & 6 Tips to Prevent an Attack
Learn all you need to know about the different types of DDoS mitigation, as well as 6 tips to prevent your website or server from an attack.
Continue ReadingWhat is Bot Traffic and Best Ways to Prevent Spam Traffic
What exactly is bot traffic? Learn how to detect non-human bot traffic, how to keep your analytics accurate, and how to protect yourself from bad bots.
Continue ReadingHow to Tell if an Email is SPAM in 5 Steps
Follow Liquid Web's 5 tips to identify dangerous spam emails and protect your inbox from malware, virus, and phishing attacks.
Continue Reading