For the potentially millions of users who are on Wordpress 4.7.0 or 4.7.1, it is recommended that you upgrade to the latest version of 4.7.2 immediately.
HostDime Completes 2016-2017 SOC 2 Audit on Orlando Facilities
As a premier global data center and infrastructure provider, HostDime.com, Inc. holds client security and privacy above all else. We further advanced this commitment by becoming SOC 2 Type 1 certified.
HostDime’s GRE Cloud Scrubbing is Our New DDoS Protection Service
Along with our local inline mitigation by Arbor Networks, we now proudly offer security cloud-based GRE traffic scrubbing.
cPanel & WHM 58 in CURRENT Tier, Adds EasyApache 4 and AutoSSL
cPanel has announced software version 58 is now available in the CURRENT tier. cPanel comes free with both a HostDime managed VPS server and managed dedicated server. Here are a few of the new features in version 58.
Clients: How to Disable Plaintext Authentication for E-mail
There’s been a change in HostDime policy and server configuration in regard to secure e-mail.
10 Easy Ways to Enhance Your WordPress Website’s Security
Wordpress, the most popular content management system used by millions of websites worldwide, is a favorite target of exploit by hackers because it is so widely used.
A Brief History of Server Room Heists
Server rooms at businesses get robbed at a much higher frequency than data centers, which is a major reason for off-site colocation. Here’s a few of the major recent burglaries that involved physical theft over virtual hacking.
Critical Security Vulnerability Found in Joomla. Update to 3.4.6 Now
Yesterday afternoon, Joomla released Version 3.4.6 to address 4 security vulnerabilities. It is highly recommended that users should immediately upgrade to version 3.4.6.
Average DDoS Attacks are Increasing in Size
“Extremely large attacks grab the headlines, but it is the increasing size of the average DDoS attack that is causing headaches for enterprises.”
Jetpack WordPress Plugin is Vulnerable, Update Now
Jetpack is one of Wordpress’ most popular plugins; the exploit affects the contact form module present in the plugin, which is activated by default.