Every web hosting provider offers site management solutions so that customers can customize their domain settings and manage their sites independently. DirectAdmin is one of the most popular tools on the market, similar to Plesk (discover Plesk security best practices) and cPanel (learn more about cPanel security). After deployment, server administrators and site owners should review configurations and follow cybersecurity best practices to protect sites from exploits and safeguard sensitive data. Although this guide does not reduce risk by 100%, following it will improve your cybersecurity posture and stop many common threats that could harm hosted sites. In this article, you will learn about DirectAdmin and discover DirectAdmin security best practices:
If you don’t use cPanel, you probably use Plesk, as it’s one of the most common hosting platforms on the market. Similar to cPanel, hackers target hosting platforms to gain high-privilege access to web applications and server resources. Plesk has several security extensions that will help harden the protection of sites, but relying on simple extensions without following best practices could still leave your site and the main Plesk master account vulnerable to malware and exploits. In this article, you will learn about Plesk and discover Plesk security best practices:
We’re pleased to announce that a new beta version of Imunify360, version 5.9, is now available. Version 5.9 is more of a maintenance release and contains no major feature updates or crucial changes. However, it precedes the 6.0 release which will bring major feature updates. In brief, version 5.9 prepares your systems for the 6.0 release. The v5.9 beta release includes the following features:
Reactive security is no longer practical to stop attackers and leaves your organization vulnerable to data exfiltration that can persist for months. It only takes a few minutes for an attacker to compromise and exfiltrate data, and afterward, your organization is left to perform clean-up.
If you don’t proactively catch threat actors, they could go undetected for months on your network, exfiltrating data silently until you finally contain the threat. An advanced persistent threat (APT) could maintain a presence on your network even when you think it’s contained. Any threat that compromises your system causes monetary loss, potential brand damage, and future legal issues. A better way of cleaning up after a compromise is to put up a better defense and implement proactive security that catches, blocks, and contains threats before they damage your systems. Imunify360 team created an article based on Igor Seletskiy's speech, the CEO of CloudLinux Inc., "Proact, not overreact", keep on reading to learn more about proactive cyber security and watch Igor's speech in the end.
Web host administrators are aware that performance is important for customer satisfaction, but what they don’t know is that performance degradation can be directly related to malware and exploited vulnerabilities on the server. Advanced threats can be difficult to detect, but web hosts must rely on website owners with leased space on the server to stop them. Imunify360 has helped numerous web hosters detect, block, and remediate threats across the entire shared server.
We’re pleased to announce that a new version of Imunify360 is now available. This new Imunify360 v.5.8.3 release includes the following.
We’re pleased to announce that a new version of Imunify360, version 5.8, is now available. The following features are new in the v.5.8 release:
We’re pleased to announce that a new beta version of Imunify360 is now available. This new Imunify360 v.5.8.2 beta release includes the following.
We’re pleased to announce that a new beta version of Imunify360 is now available. This new Imunify360 v.5.8.1 beta release includes the following.