In the series of articles at the links below, we will be talking about the dos and don’ts of security on the internet. In this day and age, almost everything we do is linked to the internet in some form or another. While this is great for convenience and communication, it can become a disaster quickly if there is a lack of good security practices.
In this overview article, we will outline the other articles in this series. For more detailed information on each topic, please click the link in the section.
…are the keys to our everyday online life. We use them for email, banks, websites, servers, and much much more. It is important that we use not only secure passwords, but passwords that other people don’t know.
…is the art of manipulating human nature to get access to what you want. Be it answers to security questions, access to your computer, or any other number of things.
…are used to obtain personal or secure information from you, normally without your knowing.
…is an account that has been “broken” into or exploited by someone who does not have permission from the account’s owner.
…is an account that has had malicious files uploaded due to either password weakness or other security holes.
Below we have links to the security sections of our knowledge base for the most popular web software for hosting websites & commerce. Please click the corresponding link for the application you use for more detailed instructions on how to make your application and your content more secure.