By default, Plesk typically stores backups on the server. This can, however, present a risk if the hard drive or RAID fails on the server. If this ever occurs, you can possibly lose both data and your backups. To avoid this situation, Liquid Web recommends storing additional backups in a remote storage location.Continue reading “How to Set Up Plesk Backups in Cloud Object Storage”
What is 2FA
Two-Factor Authentication (or 2FA as it often referred to) is an extra layer of security that is used to provide users an additional level of protection when securing access to an account.
Employing a 2FA mechanism is a vast improvement in security over the Singe-Factor Authentication method of simply employing a username and password. Using this method, accounts that have 2FA enabled, require the user to enter a one-time passcode that is generated by an external application. The 2FA passcode (usually a six-digit number) is required to be input into the passcode field before access is granted. The 2FA input is usually required directly after the username and password are entered by the client.Continue reading “How To Set Up Two-Factor Authentication in cPanel”
What Is the Liquid Web CLI Interface?
This is the official command-line interface for the Liquid Web API. CLI stands for the “command-line interface” which is used for interacting with multiple Liquid Web services via the Liquid Web’s Public API.Continue reading “How To Set Up and Use The Liquid Web CLI Interface “
What is Zero Trust Security?
Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.Continue reading “How to Implement Zero Trust Security in 5 Steps”
What is a VPN?
A Virtual private network (VPNs) creates a secure connection between a remote computer and another network. The connection itself is encapsulated and encrypted which provides a protected communications channel between the two points.
A VPN is becoming more crucial in today’s security-related society. Due to increasing safety concerns, the proportional use of these services is growing exponentially. This technology targets several critical aspects of our online experience: mainly privacy and security.Continue reading “What is a Virtual Private Network and How Does it Work? “
What is the Browser Cache?
When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.Continue reading “How to Password Protect Folders in IIS and Plesk”
What is OpenVPN?
The OpenVPN software bundle is a set of open-source, virtual private network (VPN) applications used to create a direct, secure site-to-site connection that provides remote access between two locations.
The OpenVPN Server consists of three main parts:Continue reading “How to Set up OpenVPN on Linux”
Here are the top ten password security standards and specification for 2019. Use these tips to increase your overall security and remember, your server is only as secure as your weakest password or point of authentication.
Follow these top 10 best practices for 2019 to better protect all of your information.Continue reading “Top Ten 2019 Password Security Standards”