Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
BlueScale Digital: A Customer FAQ
Today, Liquid Web proudly announced an acquisition of multiple client assets from BlueScale Digital, and we could not be happier to welcome them to the Liquid Web family! For more than 20 years, Liquid Web has been a leader in serving web professionals with highly performant services and exceptional support. This purchase includes multiple VPS, Dedicated, and Colocation clients from the following brands:
How to Install an SSL on a Core/Unmanaged Ubuntu Server
Why do I Need to Install or Reinstall My SSL Certificate?
According to Globalsign;
How to Install an SSL on a Core/Unmanaged CentOS Server
Why do I Need to Install or Reinstall My SSL Certificate?
According to Globalsign
CloudLinux Pricing Increase
Liquid Web was recently informed that the licensing cost for CloudLinux will be increasing at the beginning of the new year and will take effect on January 1st, 2021. All CloudLinux license types (both standalone and those bundled with cPanel) will increase by $2.00 per month with no variance on license type.
How to Set Up Plesk Backups in Cloud Object Storage
By default, Plesk typically stores backups on the server. This can, however, present a risk if the hard drive or RAID fails on the server. If this ever occurs, you can possibly lose both data and your backups. To avoid this situation, Liquid Web recommends storing additional backups in a remote storage location.
How to Share Encrypted Information
This article will discuss the methods to send information securely over email using GPG/PGP as the main encryption tool. The difference between PGP and GPG is mainly that PGP is a proprietary solution controlled by Symantec, and GPG is the open-source standard that is defined by RFC 4880. Functionally, each format is virtually identical due to GPG being the offspring of the original PGP standard. Because there are numerous email clients, specific GPG settings will vary. For this tutorial, we will use Gmail and Thunderbird as examples.
How To Set Up Two-Factor Authentication in cPanel
What is 2FA
Two-Factor Authentication (or 2FA as it often referred to) is an extra layer of security that is used to provide users an additional level of protection when securing access to an account.
Changing the SSH Port in WHM/cPanel in 3 Steps
While there are many ways to make sure your server is as secure as possible, there are some basic steps that we can take to increase security. Users with a Linux server can change their SSH port to something other than the SSH default port (22). The steps listed below outline how to change SSH port numbers and enable the change.
How to Install and Configure Rancher K3s
What is Rancher K3s?
K3s is an official Cloud Native Computing Foundation sandbox project that brings a lightweight, fully compliant Kubernetes distribution designed for lower resource production models like remote locations or on an IoT device. When used in conjunction with Rancher, K3s can easily be managed from within the Rancher orchestration platform.
How to Implement Zero Trust Security in 5 Steps
What is Zero Trust Security?
Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.