Articles

Security Basics for Hosting Customers This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Keep Your Hosting Passwords Safe This article explains a security or abuse topic in a practical way so customers can reduce risk... Why Two-Factor Authentication Is Recommended This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Rotate Passwords After a Suspected Leak This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Secure SSH and Control Panel Access This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Secure a Website Against Common Attacks This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Reduce Brute-Force Login Risk This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Recognize Phishing or Fake Billing Messages This article explains a security or abuse topic in a practical way so customers can reduce risk... What to Do If a Website Is Defaced This article explains a security or abuse topic in a practical way so customers can reduce risk... What to Do If You Suspect Malware on Your Site This article explains a security or abuse topic in a practical way so customers can reduce risk... How Malware Cleanup Usually Starts This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Isolate a Compromised Website Quickly This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Update Software to Reduce Security Risk This article explains a security or abuse topic in a practical way so customers can reduce risk... Why Null or Pirated Themes and Plugins Are Dangerous This article explains a security or abuse topic in a practical way so customers can reduce risk... How Abuse Reports Are Typically Handled This article explains a security or abuse topic in a practical way so customers can reduce risk... What Activity Is Not Allowed on Shared Hosting This article explains a security or abuse topic in a practical way so customers can reduce risk... What Activity Is Not Allowed on VPS Services This article explains a security or abuse topic in a practical way so customers can reduce risk... Why Bulk Unsolicited Email Is Prohibited This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Handle a Stolen Email Password Incident This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Secure WordPress Admin Accounts This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Review Access Logs After Suspicious Activity This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Protect a Customer Brand as a Reseller This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Respond to a Service Suspension for Abuse This article explains a security or abuse topic in a practical way so customers can reduce risk... How to Build Safer Day-to-Day Hosting Habits This article explains a security or abuse topic in a practical way so customers can reduce risk... General Security Responsibilities We protect the platform, but customers are responsible for the security of their own websites,... Abuse, Spam, and Prohibited Activity Services may not be used for spam, phishing, malware, abusive scanning, illegal content,... What to Do If Your Website Is Hacked If you suspect compromise, act quickly to reduce damage and prevent reinfection.Change passwords... Why a Service May Be Suspended for Security Reasons A service may be suspended to protect the platform, other users, or the customer's own data when...
« Back