Skip to main content

5 Tips and Tricks to Improve Your Server's Security

Your web servers are the focal point of all your website's security; they are where all of your information gets stored and because of this they essentially constitute what your website is.
Thus, it's not surprise that you have to keep these servers as secure as possible at all times to protect not only your online presence but also your customers and anyone else who entrusts you and your site with their sensitive private information.



Luckily, keeping your servers secure isn't really that hard and it's certainly not expensive. With a few straightforward and relatively easy to implement steps, you can eliminate an overwhelming part of your chances of getting hacked, seeing your site destroyed or your information stolen. Let's go over a few tips and tricks now.


Buy Dedicated Web Servers from a Reliable Provider

You will almost certainly be hosting your website or sites on a commercial hosting provider's servers, and this is a good idea, since they will already have their own professionally designed security measures in place. Nonetheless, not all hosting providers are created equal and not all types of hosting are equally secure. For one thing, for extra security and traffic handling capacity, you're better off buying your own dedicated server space from reliable webhost. This will cost you at least 5 times more per month than regular shared hosting, but having your own servers also makes your security much more solid and your ability to cope with Denial of service attacks more robust.



Buy Secure Hosting

In addition to buying dedicated server space, you should also review the security features your host provides to its clients. These should include: up-to-date server apps like PHP, MySQL, Apache and others, strong internal firewalls within the webhosts systems, automatic backups, internal antivirus protection, DDoS (distributed denial of service attack) protection and SFTP (secure file transfer protocol), which allows you to securely move files to your servers (thus website) from another machine.

Regularly Update All your Server and Website Applications

Your server based applications will probably be automatically updated by your hosting provider, but you will almost certainly have your own list of third party applications working on your website and installed on your servers; update these regularly. These might include applications like Flash, JavaScript or Adobe Acrobat and they could also include third party website content management systems like WordPress and all of their associated plugins. At least once a week, go through all of these applications and make sure that the versions you're using are the latest available. Outdated apps are a hacker's chief attack vectors.


Use Secure Passwords

Your hosting cPanel, servers, MySQL, FTP and any other password protected parts of your server and website controls should all be protected by highly secure passwords that are at least 10 characters long and consist of randomized upper and lowercase characters, numbers and symbols all jumbled together. An overly simple password can easily be cracked by dictionary attack software that can run millions of word combinations per second. You should be particularly careful about also adding internal passwords inside your cPanel and servers that give different levels of access to different people if you have multiple site administrators accessing your website's servers.

Secure Your Personal or Work Computer

A convenient and often forgotten access point for attackers trying to get into your servers will be your actual computer. This machine will probably contain the desktop File transfer protocol (FTP) application which you use to transfer files and media to your website. If this is the case, keep this machine safe! Install strong and regularly updated antivirus/anti spyware software on the computer, limit access to it to trusted people and make sure that both the computer and the FTP inside it are both password protected and have automatic login disabled, forcing you to type in your passwords each time you leave them for more than a few minutes.

A hacker can easily sneak hack software and malware into this computer and use it to gain access to your actual web servers either through direct attack or simply by recording the passwords you type in to reach all your secured systems. Again, keep the computers you use to access your servers secure!

Use Your Own Web Server Protection Software

Aside from the protection offered by your hosting provider's security software, you should also set up your own defense systems by using third party server and website protection applications. A powerful security software package can offer your servers diverse protection against viruses, malware, Trojan horses, data thieves, spy bots and DDoS attacks, amongst other things. Some very reliable and highly affordable server/website security products include membership software services such as Incapsula or Cloudflare.


Encrypt your Data Files

As a last quick server security tip, we should also mention internal data encryption. While encrypting any sensitive information stored on your server won't actually protect the server itself from attacks, it will at least ensure that anyone who does manage to hack your system has unreadable files on their hands, thus blocking them form finding out what sorts of customer data and other information you've got stored.

About the Author: John Dayton is a leading expert on server security tips. When he is not writing, you can find him at home or working as a consultant to partners like LWG Consulting.

To write guest posts for us, please follow the link below

Write Guest Articles for us

Comments

Popular posts from this blog

Touch Screen Games for Windows 7

The touch screen system is a great system that can make life a lot easier. It can also bridge the gap between laptop or PC and the tablet. The

Best Free Project Management Software

Businesses in today's day and age seem to be faced with various problems, such as escalating expenses, overdue deadlines, and improper delegations of tasks, to name a few. Because of this, it would be of the utmost essence for companies to choose the perfect project management software for their business. Fortunately, there are many options in today's market that can satisfy practically any demand a business might have, regardless of how big or small it might be. Here are some of the best offerings in project management software today: 1. Asana Asana focuses mostly on improving a team's workflow. One advantage that this service has over the rest is that smaller teams can use it completely free of charge. Also, aside from all of the basic features that project management tools tend to have, Asana developers have made it possible for users to get task notifications directly in their email inboxes. Plus, Asana can be used on most tablets and mobile phones. In fact, it eve...

How mobile monitoring apps are changing the spy world?

Parents always expect the best out of their children, and so does the employers from their employees. For instance, parents buy their kids a smartphone, and expect them to do well in their academics. Similarly, an employer issues smartphones to their employees to ensure that they excel at work, and contribute towards maximizing profits in the business. However, when expectations are not met, or if you sense that there is something inappropriate concerned to their activities or behavior, then the need to monitor their cell phones arises. In addition, if you suspect that your spouse is giving your share of time and attention to another person, you are certainly left with no option but to monitor their activities. Role of Mobile Monitoring Apps The best method to monitor on someone is through mobile monitoring applications. These apps make your task of monitoring simpler like never before. The application fulfills the spying requirements of distinct individuals accurately. It not o...

Construction Tips for Your Roof

A home has to include all the necessary features from sinks, toilets, showers, etc, be fitted with all the necessary furniture from beds to cupboards, it must keep your warm and safe, and much more.

Best iPad games: see what others are playing

If you’re looking to have some mega-fun on your iPad, then you need to look for the kinds of games that have gained massive popularity. Their

The Emerging Revolution in Game Theory

Prison’s Dilemma has been around for quite some time. Everyone had thought that they had figured out the strategy.

Time to Think about Time

This is a guest post by Isabella . The Millennium Bug seems like a long, distant memory, but in the late 1990s, the Y2K bug was sending fear and panic among network administrators, governments and businesses alike. Cash machines were expected to start dishing out dollars like fruit machines, high interest current accounts would empty, planes would fall from the sky and the world was going to plunge back into the dark ages, as every computer system failed. Okay, things didn’t seem to work out to be that bad. Few if any major computer meltdowns occurred, and the world moved on. The threat of the Millennium Bug was quite simply caused by a lack of foresight by computer manufacturers and programmers. Many computer programs only bothered to store the year in two decimal places, which meant that come the year 2000, a lot of timestamps would go from 99 to 00, essentially making the computer believe it was the year 1900. The debate was never settled whether the Y2K bug was just a damp sq...

Company Takes on Social Media Background Checks for You

There was a day and age where job applicants only had to concern themselves with what was on their resumes and pretty much nothing else. In today's Internet age, however, social media is a big factor and is becoming even bigger as people look for work in the challenging economy. Whether it is what one perceives as an innocent picture or comment that was meant in jest, what individuals say on their Facebook, Twitter, LinkedIn, Google+ accounts, and other social media sites is being more closely monitored. According to one CareerBuilder survey of approximately 2,000 hiring managers and human resources professionals, 37% of HR managers reported using social media sites to attain more information on prospective candidates as part of the background checks process. Meanwhile, another 11% said they would be doing likewise soon. For those businesses that may just be starting out or have been around for a while but are newer to social media, social media background checks need to be d...