Security Overview
Security isn’t a single setting you flip on once. It’s a process that touches every layer of your stack, from account passwords to network firewalls and SSL/TLS. Our security articles cover four main pillars of security:
- Account & Access – lock down logins with strong passwords, two-factor auth, and secure notes.
- Network Protection – shield ports with Cloud Firewall rules and VPN tunnels before traffic even hits your server.
- Server Hardening & Monitoring – minimize attack surface (services, permissions, file-system tweaks) and run scheduled vulnerability scans.
- Encryption & Certificates – keep data in transit private with correctly installed, auto-renewing SSL certificates.
Security Articles
This collection of articles serves as your central resource for understanding, and managing the security of your Liquid Web account, server and websites.
-
TLS Hardening
Read more: TLS HardeningGo beyond basic SSL. TLS hardening strengthens your server’s encryption by disabling weak protocols and ciphers to protect against modern attacks.
-
Using cPHulk to Prevent Brute-Force Attacks
Read more: Using cPHulk to Prevent Brute-Force AttackscPHulk is an added security feature in WHM, blocking login attempts in various services without affecting regular traffic.
-
Using mod_qos and mod_reqtimeout to mitigate Slowloris attacks
Read more: Using mod_qos and mod_reqtimeout to mitigate Slowloris attacksProtect your Apache server from Slowloris attacks. Learn how to install and configure mod_qos, set up connection limits, and integrate with CSF.
-
What are CVEs and How are They Scored?
Read more: What are CVEs and How are They Scored?Common Vulnerabilities and Exposures listings, or CVEs, is a system of classifying vulnerabilities including a numeral score describing its severity.
-
What are the advantages of using SSH keys to control access for multiple users?
Read more: What are the advantages of using SSH keys to control access for multiple users?SSH keys offer a means for site administrators to allow multiple individuals to share one user and all associated permissions while remaining PCI-compliant.
-
What is “Least Privilege”?
Read more: What is “Least Privilege”?Secure your server using the Principle of Least Privilege (PoLP). Learn how restricting user access prevents malware and how to manage file permissions.
-
What Is a Brute-Force Attack?
Read more: What Is a Brute-Force Attack?Brute-Force Attacks: Attackers try all possible password combinations, using scripts, to access data. Growing threat due to faster hardware.
-
What Is a Denial-of-Service (DoS or DDoS) Attack?
Read more: What Is a Denial-of-Service (DoS or DDoS) Attack?Denial-of-Service (DoS) attacks flood a server with traffic, preventing legitimate users from accessing a website. Learn to mitigate network-focused DoS attacks in this article.