<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
New Hosting Revenue — Unlocked!
Launch your own professional WordPress services without upfront
investment or headcount. Powered by Seahawk — Branded as you.

How to Manage Imunify Security Notifications

IM_securitynotifications

We designed a set of messages to report information about security threats that are dangerous for the server. Imunify uses cPanel contact manager to send notifications about those threats. We hope you will find them helpful. This feature can be managed through CLI. 

How to Manage Imunify Security Notifications

IM_securitynotifications

We designed a set of messages to report information about security threats that are dangerous for the server. Imunify uses cPanel contact manager to send notifications about those threats. We hope you will find them helpful. This feature can be managed through CLI. 

Imunify Firewall Module v7.6 Released

IM360-beta-release

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.6 is now available!

Imunify Firewall Module v7.6 Released

IM360-beta-release

We’re pleased to announce a new beta version of the Imunify360 Firewall module. Version 7.6 is now available!

What are Steps to Secure a Linux Server?

IM_securitysteps

Overall, the Linux operating system is very secure, but the applications, tools, and configurations administrators install create risks to the environment. Linux powers 75% of the internet, and it’s installed on 6.64 million web servers. Because Linux powers critical systems around the globe, it’s imperative that administrators take the necessary steps to harden the operating system’s security. Although Linux is inherently secure, several configurations and strategies help harden its defenses and reduce the risk of a compromise. This article goes over the following questions:

What are Steps to Secure a Linux Server?

IM_securitysteps

Overall, the Linux operating system is very secure, but the applications, tools, and configurations administrators install create risks to the environment. Linux powers 75% of the internet, and it’s installed on 6.64 million web servers. Because Linux powers critical systems around the globe, it’s imperative that administrators take the necessary steps to harden the operating system’s security. Although Linux is inherently secure, several configurations and strategies help harden its defenses and reduce the risk of a compromise. This article goes over the following questions:

Top 10 Web Hosting Security Best Practices

IM_TOP10sec2

The internet contains over 1.7 billion websites, and every one of them is hosted by at least one web server. A web server can host hundreds of sites on one physical machine, but depending on the way it’s hosted, just one hacked website can be the downfall for all sites on the server. Security for web hosters is more important than ever as more customers depend on your cybersecurity best practices and monitoring to find ongoing attacks. Web servers usually host several business sites, which store customer data, so they are common targets for attackers. So, we've put together a list of hosting security best practices and tips essential for web hosting security. This articles covers the following hosting security topics:

Top 10 Web Hosting Security Best Practices

IM_TOP10sec2

The internet contains over 1.7 billion websites, and every one of them is hosted by at least one web server. A web server can host hundreds of sites on one physical machine, but depending on the way it’s hosted, just one hacked website can be the downfall for all sites on the server. Security for web hosters is more important than ever as more customers depend on your cybersecurity best practices and monitoring to find ongoing attacks. Web servers usually host several business sites, which store customer data, so they are common targets for attackers. So, we've put together a list of hosting security best practices and tips essential for web hosting security. This articles covers the following hosting security topics:

Server Security Best Practices: 10 Tips to Protect from Cyber Attacks

Web-Server-Security-Best-Practices-1

A system administrator (or sysadmin) is perhaps one of the most stressful careers available to an aspiring computer science and information technology student. Sysadmins are typically responsible for network and computer systems, including but not limited to server security. A sysadmin’s job, therefore, is stressful because at any time an organization’s servers may fall victim to cyber attacks.   

Server Security Best Practices: 10 Tips to Protect from Cyber Attacks

Web-Server-Security-Best-Practices-1

A system administrator (or sysadmin) is perhaps one of the most stressful careers available to an aspiring computer science and information technology student. Sysadmins are typically responsible for network and computer systems, including but not limited to server security. A sysadmin’s job, therefore, is stressful because at any time an organization’s servers may fall victim to cyber attacks.   

NameHero Fortifies Web Hosting Security and Efficiency with Imunify360

Imunify360: Empowering NameHero's Security Transformation

In the world of web hosting, security reigns supreme. For hosting providers like NameHero, ensuring website safety, streamlining operations, and upholding trust are top priorities. Discover how Imunify360 revolutionized their approach to security and operations.

NameHero Fortifies Web Hosting Security and Efficiency with Imunify360

Imunify360: Empowering NameHero's Security Transformation

In the world of web hosting, security reigns supreme. For hosting providers like NameHero, ensuring website safety, streamlining operations, and upholding trust are top priorities. Discover how Imunify360 revolutionized their approach to security and operations.

Release Notes: Enhanced Integration for Generic Panels

 

IM360-major-release

IMPORTANT: Upcoming Requirement for Configuration

 

In one month, a change will take effect for all users utilizing generic control panel integration.

The "[integration_scripts].panel_info" option, currently optional, will become mandatory. This requirement is exclusive to generic control panel users and does not apply to those on cPanel, Plesk, or DirectAdmin.

We ask you to prepare by populating this option with the appropriate script, as detailed in our documentation: Specifying Panel Information Documentation.

Release Notes: Enhanced Integration for Generic Panels

 

IM360-major-release

IMPORTANT: Upcoming Requirement for Configuration

 

In one month, a change will take effect for all users utilizing generic control panel integration.

The "[integration_scripts].panel_info" option, currently optional, will become mandatory. This requirement is exclusive to generic control panel users and does not apply to those on cPanel, Plesk, or DirectAdmin.

We ask you to prepare by populating this option with the appropriate script, as detailed in our documentation: Specifying Panel Information Documentation.

ImunifyAV is now the Default Anti-virus in Webuzo!

imunifyAV&webuzo

We are thrilled to share that Webuzo, a leading web hosting platform that simplifies the management of cloud or dedicated servers, has officially integrated ImunifyAV as its default antivirus software, recognizing the importance of top-notch security for its users.

ImunifyAV is now the Default Anti-virus in Webuzo!

imunifyAV&webuzo

We are thrilled to share that Webuzo, a leading web hosting platform that simplifies the management of cloud or dedicated servers, has officially integrated ImunifyAV as its default antivirus software, recognizing the importance of top-notch security for its users.

Subscribe to Imunify security Newsletter