Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
You will find more infographics at Statista I would recommend reading the article for more information. Users should note that the primary vector for infection is an infected email. Do not follow a link from an email or download an attachment unless you know who sent it, trust them completely, and are confident of the…
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
Whether or not you use gmail, you should read this. The article is from Wordfence, which primarily does WordPress security, but they have previously published excellent work on other attacks, and every word of their advice is good. In particular, the advice to carefully read your address bar to make sure you are where you…
A recent post on the Wordfence blog discusses a major set of attacks against WordPress sites, title WP-VCD. Most of my readers will not be interested in the technical details (which are, in fact, very interesting!), but the basic actions to keep your site secure listed near the end are worth your time. If you…
I cannot think of anything that will spare computer users more annoyance and hardship than being careful of what they install on their computers. I’ve cleaned up several machines recently, and in every case there were multiple toolbars, numerous search providers, and a number of utilities. In each case the users could not tell me…
In a number of webinars I’ve attended this year on information security, I have been alerted to the changes AI is making to email scams. Background Email is the most effect tool for attack that hackers have, because if an email looks like it is from a particular company or from someone known to the…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)