25th Anniversary Savings | 25% Off Dedicated Servers*Shop Now
25th Anniversary Savings | 25% Off VPS Hosting* †††Shop Now
Limited Inventory: High-Performance AMD-Powered Servers Now Available.* Shop Now >
Dedicated Hosting Deals | From $99/moShop Now

Tag: Backups

Reading Time: 11 minutes

How Can You Ensure Security on a Server?

It is important to secure your server to prevent data loss or security compromises. Because security is such a challenging subject for many, it often goes unheeded. Many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →

How to Backup Your Website in cPanel

Posted on by Ronald Caldwell | Updated:
Reading Time: 3 minutes

Maintaining your website means making sure software updates don’t take down your site. Knowing how to backup your website in cPanel allows you to ensure you can restore your site if an update happens. Use this guide to ensure your website is properly backed up for updates, testing, and other maintenance you need to perform.

Continue reading →

How to Backup a Database: Complete Guide

Posted on by Mohammed Noufal | Updated:
Reading Time: 7 minutes

Generating frequent backups of databases is important to recover data and rerun it if any problems occur. Such problems include:

Continue reading →
Reading Time: 5 minutes

The term bare metal means a computer with no operating system, no partitions, and no installed software applications. It is the bare hardware and disk. In some instances, it may contain the basic input/output system (BIOS).

Continue reading →

What is a Backup?

Posted on by Jackie Cowan | Updated:
Reading Time: 4 minutes

A backup is a duplicate record of computer or server information stored locally on either your computer or server or at an off-site location or separate device. Backups are typically used to restore lost or corrupted data from the secondary location back to the primary generally in the event of a security breach, hardware failure, or natural disaster.

Continue reading →
Reading Time: 7 minutes

Minecraft is a sandbox/adventure game that challenges you to survive and explore an infinite world that you can modify at will. Just a few years after launching in 2009, Minecraft exploded in popularity, eventually becoming the highest-selling game of all time at 200 million copies.

Continue reading →
Reading Time: 3 minutes

Introduction

Far too often, we forget about backups until we need them, like in the case of a drive failure or the accidental deletion of a file or database. Taking frequent backups is a good policy to follow. Whether you choose to use one of your servers, an online backup service that provides SFTP access, or another method, having a cost-effective and reliable backup provides peace of mind.

Continue reading →
Reading Time: 4 minutes

Now more than ever, it is imperative for companies and owners to have disaster recovery at the forefront of their minds. Not only are local backups important, but off-server backups are the second layer of protection from a system failure that could make even local backups unavailable for restoring essential data.

Continue reading →
Reading Time: 5 minutes

There are many advantages to our Managed Private Cloud powered by VMware setups, and one of them is the Acronis backup service. If you don’t have Acronis Cyber Backups, they are currently available for both our managed and unmanaged Dedicated Servers, Cloud Server Clusters, and VMware deployments. We will review how to complete file restorations when using the Acronis appliance on a VMware deployment in this how to.

Continue reading →
Reading Time: 5 minutes

Introduction

Intrusion detection systems (IDSs) are an ever-present requirement in a cybersecurity infrastructure to ensure a server or internal network is protected. An intrusion detection system is either a hardware device or software program that actively monitors a server or group of servers for network policy violations or malicious activity. Any suspicious activity, attempted attack, or policy violation is reported and logged to a centrally located security information and event management (SIEM) system database, or directly to a security administrator for further review. This article explores Liquid Web’s intrusion detection product called Alert Logic Security and Compliance Suite.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434