Reading Time: 6 minutes
What happens when a site is compromised? How quickly can you respond when you recognize the signs that something is amiss? In today’s article, we will explore some of the more common indicators of a compromised website, how you can spot it, and how to act on it in a timely manner.
Continue reading “What Indicates A Compromised Website?”
Reading Time: 16 minutes
In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.
Continue reading “Top 15 Server Security Practices for 2020”
Reading Time: 2 minutes
While automated backups are important, sometimes you just want to take a MySQL dump of the database prior to making a change to your site. When modifying files in Linux, you can simply copy a file to another name in order to make a new copy. In this tutorial, we will show you how to create a backup of your database (or multiple databases) and also how to restore a backup from either command line or cPanel.
Continue reading “How to Back Up And Restore MySQL Databases From The Command Line”
Reading Time: 5 minutesThe most important thing you can do to protect your server against data loss is to take regular backups. Properly configured backups are a critical aspect of the maintenance of any website and can mean the difference between a quick recovery and rebuilding a site from scratch. If a critical file were to be deleted accidentally, a database became irreparably corrupted, or your site was infected with malware, would you be able to restore your data and get your site back up within a few minutes?
If you can’t answer “yes” to these questions, then it’s time to review your backup strategy.
Continue reading “How To Enable Server Backups in WHM/cPanel”
Reading Time: 4 minutesWordPress is one of the most popular Content Management Systems on the Internet. Due to it’s popularity, it is also the target of many hackers. We’re here to show you our top 5 recommendations on how to secure your WordPress site based on issues we’ve come across.
Continue reading “How To Secure Your WordPress Site”
Reading Time: 6 minutesOur last article on Ubuntu security suggestions touched on the importance of passwords, user roles, console security, and firewalls. We continue with our last article and while the recommendations below are not unique to Ubuntu specifically (nearly all discussed are considered best practice for any Linux server) but they should be an important consideration in securing your server. Continue reading “How Do I Secure My Linux Server?”
Reading Time: 4 minutesThis guide walks you through some common tasks surrounding a Postgres server. In this tutorial, we’ll cover installing Postgres, creating new databases and users, backing up databases, and more! Let’s dig in! Continue reading “Common Postgres Tasks on CentOS 7”
Reading Time: 4 minutesAs most any computer user knows, anytime you add or remove crucial data from your computer you should make a form of backup just in case something occurs that may destroy this information. Continue reading “Configuring S3 via WHM/cPanel”
Reading Time: 3 minutes
Cron jobs are an incredibly useful Linux tool aimed at saving you time by scheduling tasks within your server. A programmed cron task will execute commands within a script by the minute, day, week or month. They can be scheduled to do many tasks including backing up your server’s files nightly, updating inventory orders in a database or even compressing files for migrating. Repetitive tasks become a cinch when incorporating a cron job. While there are numerous ways to run a cron task, we will be using the crontab option that is inherent within Ubuntu to set up a nightly backup of our website.
Continue reading “Create a Cron Task in Ubuntu 16.04”