Select your language

To protect your website from attacks, you should regularly maintain your website and the applications behind it.

We have summarized the most important tips to be observed in this article.

Webhosting protection

Update your website

To guard against attacks, it’s important to keep all of your installations up-to-date, including the core installation and all plugins, extensions and themes. This applies to all content management systems (CMS), such as WordPress, Joomla!, Drupal, TYPO3, phpBB, Magento, etc.

Passwords

For maximum security, always use a secure password.

This should not be a readily comprehensible word; it should contain uppercase and lowercase letters as well as numbers/special characters; and it should be at least 8 characters long.

Two-factor authentication

You can additionally protect access to the Hostpoint Control Panel with your Hostpoint ID using two-factor authentication. This enables you to prevent unauthorised persons from accessing your contracts or services. You can find instructions on how to set this up here: Where do I activate two-factor authentication?

Unused web pages, plugins and themes

If you have created web pages and installed any plugins or themes that you no longer use, you should delete them. If one of these installations/components is obsolete and accessible via the web, a hacker could launch an attack from it.

Security plugins for your website

Depending on the application you are using, it is worth installing a firewall and a two-factor plugin. These help secure your website.

WordPress for example offers several tools:

Backups

If you perform regular local backups, you’ve already taken a big step. If something happens, you will be able to quickly restore your data (files and database).

This article shows you how to back up your data locally from your Hostpoint Control Panel: How do I create a backup?

Local protection

Operating system

Your locally installed operating system is an important element in the protection of your infrastructure and therefore your website too.

Regardless of the software maker, it is always important to use the latest version to prevent old security vulnerabilities from being exploited.

So make sure to regularly update your operating system. Many operating systems allow you to install these updates automatically.

Antivirus/Firewall

Antivirus protection is important for all operating systems.

Viruses can spread quickly on operating systems that are not up-to-date – this applies not only to Windows, but also to Apple macOS, for example.

Always install an antivirus program and firewall to prevent as many attack vectors as possible.

Software

All of the software you use (Office, e-mail client, etc.) must be updated on a regular basis.

Security vulnerabilities can crop up anywhere, and regular updates protect your software from being misuse.

Browser

You use your browser to directly access your website, server or e-mails. So it’s crucial that you close any security holes to protect them.

Older browser versions sometimes contain dangerous vulnerabilities, so always make sure to install all browser updates.

Free applications

You should not use software obtained for free (or that is normally subject to charge but offered free on unofficial websites). Or proceed with great caution at the very least.

These applications often include malicious code, which can harvest your password or install additional malware, for example.

So you should only install applications from official sources and consider whether an application is truly “free”, or whether it’s making money in some other way.

E-mail security and prevention

Mobile

If you have set up your e-mail account on a smartphone or tablet, it is important to keep the device up-to-date.

Just like a PC or Mac, an obsolete version may contain security holes that can be exploited by unknown parties.

Many reputable antivirus programs now offer versions for smartphones as well.

Unknown devices

If you are checking your e-mails from a device that does not belong to you, that is not up-to-date or has been manipulated in some way, it is possible that the data you enter may be copied!

You should avoid saving your passwords on such devices.

WLAN connections

Only use WLAN connections that are encrypted; unsecured networks can open the door for data theft.

When setting up an e-mail account, make sure that you always use TLS/SSL. The correct settings for your e-mail software can be found here: Enable SSL for Mailaccounts

Spam and phishing e-mails

The people sending these e-mails are trying to get their hands on information that will put money in their pockets, one way or another. Usually these e-mails include attachments containing viruses or links to manipulated websites.

Phishing e-mails often look deceptively real and come from known (yet faked) senders. An article on this topic can be found here: Fake E-Mails in circulation

Please use this form only to provide feedback on the above guide.
For support requests please use this form instead.

 

 

© 2001 - Hostpoint AG
Cookie

Wir verwenden Cookies  🍪

We use Cookies  🍪

Nous utilisons des cookies  🍪

Utilizziamo dei cookie  🍪

Die digitalen Auftritte von Hostpoint (Website, Control Panel, Support Center etc.) verwenden Cookies. Diese werden dazu verwendet, um Daten über Besucherinteraktionen zu sammeln. Wenn Sie auf «Akzeptieren» klicken, stimmen Sie der Verwendung dieser Cookies für Werbezwecke, Website-Analyse und Support zu. Gewisse essenzielle Cookies sind jedoch für eine ordnungsgemässe Funktion dieser Seiten unerlässlich und können deshalb nicht deaktiviert werden. Auch ohne Ihre Zustimmung können gewisse Daten in anonymisierter Form für statistische Zwecke und zur Verbesserung unserer Websites verwendet werden. Bitte beachten Sie unsere Datenschutzerklärung.

Hostpoint's digital presences (website, Control Panel, Support Center, etc.) use cookies. These are used to collect data on visitor interactions. If you click “Accept”, you agree to the use of these cookies for advertising purposes, website analysis and support. However, certain cookies are essential for the proper functioning of these pages and therefore cannot be disabled. Even without your consent, certain data may be used in anonymized form for statistical purposes and to improve our websites. Please note our Privacy policy.

Le sites Web de Hostpoint (site Web, Control Panel, Centre d'assistance, etc.) utilisent des cookies. Ces cookies servent à collecter des données sur les interactions des visiteurs. En cliquant sur «Accepter», vous consentez à l’utilisation de ces cookies à des fins de publicité, d’analyse du site Web et d’assistance. Certains cookies essentiels sont cependant indispensables au bon fonctionnement de notre sites Web et ne peuvent donc pas être désactivés. Même sans votre consentement, certaines données peuvent être utilisées sous forme anonymisée à des fins statistiques et pour améliorer notre sites Web. Veuillez prendre connaissance de notre Déclaration de protection des données.

Le presenze digitali di Hostpoint (sito web, Pannello di controllo, Support Center, ecc.) utilizzano i cookie. Questi vengono utilizzati per raccogliere dati sulle interazioni dei visitatori. Facendo clic su «Accetta», acconsente all’utilizzo di questi cookie per scopi pubblicitari, di analisi del sito web e di supporto. Alcuni cookie essenziali sono tuttavia indispensabili per il corretto funzionamento di questi siti web e pertanto non possono essere disattivati. Anche senza il Suo consenso, determinati dati potrebbero essere utilizzati in forma anonima per fini statistici e per l’ottimizzazione dei nostri siti web. Si prega di tenere conto della nostra Dichiarazione per la pivacy.

Ablehnen
Decline
Refuser
Rifiuta
Akzeptieren
Accept
Accepter
Accetta