What Indicates A Compromised Website?

Reading Time: 6 minutes

Introduction

What happens when a site is compromised? How quickly can you respond when you recognize the signs that something is amiss? In today’s article, we will explore some of the more common indicators of a compromised website, how you can spot it, and how to act on it in a timely manner. 

Continue reading “What Indicates A Compromised Website?”

How to Secure a Site in IIS

Reading Time: 6 minutesWhen investigating site infections or defacing on a Windows VPS Server, the most common root cause is poor file security or poor configuration choices when it comes to how IIS should access file content.  The easiest way to prevent this is to start with a secure site.

Continue reading “How to Secure a Site in IIS”

Malicious Activity Detector (MAD) for Windows

Reading Time: 3 minutesOne of the simplest goals of server security is keeping administrator credentials private. There is no better way to achieve this than through strict firewall rules that only allows specific IPs to authenticate. However, there are some situations where it is necessary to open a login prompt to the broader Internet. In this case, the only thing barring anonymous internet users from unauthorized access is your password. The stronger your password, the better off you are, but even the most cryptic passwords can be guessed given enough tries.

Continue reading “Malicious Activity Detector (MAD) for Windows”

Malware – How to Detect and Remove

Reading Time: 2 minutesMaldet, a free popular malware scanning software for Linux servers, can be used to scan an entire server for potentially malicious files. Properly configured and monitored, it can even be used to disable or fully remove malware when it is detected. However, the removal of files should only be configured once you are certain no false positives will be picked up in the scans.

Continue reading “Malware – How to Detect and Remove”