Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
I’m just calling attention to this again, because I so frequently find all kinds of utilities on people’s machines. They don’t know what they are and don’t use them. They come from add-ons to installations. I wrote about this just under a year ago, in a post titled Security and Performance Tip: Installing Software. The…
An answer to the question: Do You Need a WordPress Security Plugin? The explanation is also useful in helping those who aren’t experts understand why computer security must be regularly updated.
I just got notice of a vulnerability in Firefox from Wordfence. I have no original information, but I have generallly found that the Wordfence people provie good information. I will post a comment here (an a note at the top of this post) when this vulnerability has been fixed. The one way to avoid the…
Wordfence is providing another excellent public service announcement, this time regarding hijacked extensions. While the method of attack is interesting, there are a number of important actions recommended in the post. I’d like to call your attention to a few: Don’t trust links in e-mails. As we become used to search bars being combined with…
More than a decade ago I was called in to do some work on the computer used by an office receptionist. After hearing the explanation, I sat down for what would be a rather easy job. Moments later, the receptionist interrupted me and said, “I guess you’ll need my password.” Problem was, I was already…
Multiple recent incidents of clients having difficulties with email attachments have set me to calling people to remind them of good security practices with email. You don’t have to be a victim. Dealing correctly with attachments to emails is extremely important because it has become one of the primary vectors for attacking your machine. The…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)