Zen Managed ServicesZen Managed ServicesZen Managed ServicesZen Managed Services
  • Services
    • Domain Names
    • Managed Cyber Security
    • Secure VPN
    • Hosting
      • Managed WordPress Hosting
      • ColdFusion Hosting
      • Lucee Hosting
      • SmarterMail Hosting
    • Migration Services
    • Managed WordPress
    • Email Filtering & Archiving
    • Acronis Cloud Backup
  • Support
    • Open Ticket
    • Knowledgebase
    • News/Announcements
  • BLOG
  • Contact
  • Clients
    • Client Area
    • Hosting Control Panel
    • RMM Dashboard

Is your hosting provider secure?

    Home News Is your hosting provider secure?
    NextPrevious

    Is your hosting provider secure?

    By russmichaels | News, Security | 0 comment | 22 March, 2017 | 0

    In the past month, WordFence forensic analysts ran into two situations where they saw a significant number of site cleaning customers, all from the same hosting companies, all with the same malware. In both cases the sites were infected due to a hosting company security issue.

    If your WebSite has been hacked, please do  reach out to us for assistance, we can get you cleaned up and migrated to a safe and secure environment. Checkout out Managed WordPress hosting.

    If you would like us  to audit your curent host and make sure they are safe and secure, or to lock down your WordPress site, then we can do this too.

    — from the wordfence team

    We have seen a third host this week that is not correctly isolating customer accounts on shared servers. They appear to have a filesystem permissions issue. They haven’t had any problems yet, but it is just a matter of time.

    We decided to write a quick post that helps you determine whether your hosting company may be putting you at risk and whether that risk can be mitigated or whether you should consider moving to a new hosting company.

    The following are questions we think your hosting company should be able to answer.

    Are you running up-to-date versions of the following products: CPanel, Operating System, Caching Technology, PHP, phpMyAdmin and MySQL?

    In our Learning Center article on security hardening for WordPress sites, we have a great section and accompanying graphic on what your hosting provider is responsible for versus you, the site owner.

    The important takeaway here is that the hosting company is actually responsible for a lot. Even if you are managing the security aspects of your website flawlessly, you could still be at risk if your hosting company isn’t holding up their side of the bargain.

    One of the hosting companies we referred to earlier in the post was running a version of phpMyAdmin that is almost 2 years old and contains multiple known security vulnerabilities. It was no surprise to us that their customers were getting repeatedly hacked.

    You should note that a host may be able to run an older version of software if they use ‘backported’ security fixes. That means they are using old software that has had new security fixes applied. If you do find that they are running an old version of something, ask them if they have applied the latest security fixes.

    We are constantly reminding everyone to keep their themes, plugins and WordPress core up to date. Make sure that your hosting company is keeping the rest of your site software up to date as well.

    Are you completely isolating hosting accounts from each other? Or is it possible for one hosting account to read files in another account on the same server?

    We have seen hosting companies who were not correctly isolating user accounts from each other. That means that if an attacker gets a hosting account at one of these companies, perhaps by using a fraudulent card, they can access files in other hosting accounts.

    In one case, an attacker was using an existing hosting account to read the wp-config.php file in other hosting accounts which contains the database server address, username and password. The attacker then simply used their database access to create an admin level user and they had full access to the compromised website in the target hosting account.

    You should ask your hosting company if other users on the same server as you can access your account. Users on your server should not be able to access any files in your account. Accounts should be completely isolated. 

    Are my server logs available and how long are they kept?

    When a WordPress website is compromised by an attacker, one of the most important sources of information our forensic team has to determine how the site was hacked are the server logs. Unfortunately we often find that customers with entry-level hosting plans either don’t have access to server logs at all, or that they are retained for such a short amount of time that they aren’t helpful.

    We recommend a WordPress hosting plan that gives you immediate access to log files going back at least 24 hours. Ideally you should also have the ability to archive log files that are older than 24 hours, for 30 days.

    How are you backing up my site and how long are backups being retained?

    The fastest way to recover from a hacked website is by restoring a good backup of your site. Having quick access to a backup of your site can save you time, money and a lot of work. Find out what your hosting company is backing up, how long they are retaining it and where they are storing it.

    If you’re on an entry-level hosting plan it is very likely that you will need to augment what your hosting company is already doing. In many cases they may not be doing anything at all.

    Does my current hosting plan allow me to enable HTTPS?

    In the Introduction to WordPress Security article in our Learning Center we explain why it is crucial to only log into your website via a secure connection. If you aren’t currently logging into your site securely, drop everything you are doing and go fix that right away. An attacker who is listening to your network traffic can steal your username and password, taking control of your website.

    There are additional benefits to running https. It will improve your SEO rankings and it will protect any other data you are capturing via forms and payment screens on the rest of your site. We strongly recommend that you run an https-only website if possible.

    Conclusion

    We hope this post helped bring awareness to some of the hosting-related security issues that you need to stay on top of. Your hosting company plays a critical role in securing your website. Unfortunately not all of them are created equal, so make sure that yours is providing a strong security foundation for your WordPress website.

    No tags.

    russmichaels

    More posts by russmichaels

    Related Posts

    • New Gmail security features to protect you from phishing and ransomware

      By russmichaels | 0 comment

      Google is rolling out new security features to help organizations halt email as the attack vector for ransomware. While mass ransomware attacks have become less frequent, targeted attacks are on the rise and causing majorRead more

    • cybersecurity

      Updates to our Cybersecurity solution

      By russmichaels | 0 comment

      Bitdefender has recently released Anti-Exploit, Ransomware Vaccine and Zero Day protection to their Gravity zone product. Anti-Exploit provides on-execution protection against exploit attempts targeting known and unknown vulnerabilities in commonly used applications, such as browser,Read more

    • How to make your Website GDPR compliant

      By russmichaels | 0 comment

      Beginning May 25, 2018, The  GDPR says that users have complete control over their data, and you have to tell them why you need it. At which point, they can give the go-ahead or not.Read more

    • Are you ready for GDPR?

      By russmichaels | 0 comment

      In the last few years you would have heard  about the growing use of data collection, which is allowing brands and organisations to track everything you do online and offer more tailored, targeted and personalisedRead more

    • ALERT: Your SSL may need re-issuing

      By russmichaels | 0 comment

      Since March 2017, Google and Symantec have been involved in a dispute over Symantec’s validation process for SSL certificates (read more here). Google has announced a solution that will have an immediate impact on youRead more

    NextPrevious

    Categories

    • News
    • Products & Services
    • Security
    • Tutorials
    • Uncategorized

    Recent Posts

    • Voice cloning – the latest cybersecurity threat
    • 7 ways to defend your network from fatal DDoS attacks
    • New Gmail security features to protect you from phishing and ransomware
    • Updates to our Cybersecurity solution
    • DON’T MISS OUT! – Last chance to claim your .uk domain name

    Recent Comments

      Archives

      • May 2023
      • November 2020
      • June 2019
      • April 2018
      • March 2018
      • November 2017
      • September 2017
      • August 2017
      • July 2017
      • June 2017
      • May 2017
      • April 2017
      • March 2017
      • February 2017
        Legal Documents
      • Hosting Master Service Agreement
      • Terms & Conditions
      • Privacy Policy
      • Services
        • Domain Names
        • Managed Cyber Security
        • Secure VPN
        • Hosting
          • Managed WordPress Hosting
          • ColdFusion Hosting
          • Lucee Hosting
          • SmarterMail Hosting
        • Migration Services
        • Managed WordPress
        • Email Filtering & Archiving
        • Acronis Cloud Backup
      • Support
        • Open Ticket
        • Knowledgebase
        • News/Announcements
      • BLOG
      • Contact
      • Clients
        • Client Area
        • Hosting Control Panel
        • RMM Dashboard
      Zen Managed Services