Design & Development
It is extremely important to have your website backed up regularly. The website backup means that you can have a similar copy of your content and data with you. You can keep it safe. Whatever happens to your website, the data will be available to you, and you can use it later. The top 10 reasons for needing a backup are:
- Guarding against human-error
- Reverse Problems During Updates
- Preventing Data loss
- Capability issues after new installations
- Fix malware infections
- Maintain Hacker Protection
- Enabling easy Site Migration
- Testing a new version of your website
- Having your revenue stream not interrupted
- Making sure you have strong Security Practices.
A content management system (cms) is a tool that helps you build a website without needing to write all the code from scratch (or even know how to code at all).
Our CMS of choice is WordPress, although we have clients who prefer using a different CMS.
Our reasons for using WordPress have been outlined here.
An security certificate is also called a SSL Certificate. When a site has an SSL Certificate the web address (URL) is prefixed with HTTPS instead of HTTP. In 2018 Google made a decision to add SSL to the ranking algorithm it uses as a mandatory item. This has meant that websites have needed a SSL Certificate to help with Search Engine Optimisation.
Apart form helping with your Search Engine Rankings having a Security Certificate also helps with:
- Protecting your data on your website
- Your website Identity is authenticated
- Helps with accepting online payments
- Improves customer trust.
Domain Management
Domain Names are basically Licensed to you. You do not own them. The length of a domain name registration in .au zone is two (2) years. Other zones have different lengths of domain name registration. For example a .com domain can be registered for a minimum of one (1) year.
90 days before your domain is due for license renewal, you are advised by email.
As Atcom Host would look after this for you, you can be assured we will renew your domain on time.
Disk space is the allocation of hosting storage allocated to your website to use. Atcom Host allocates the amount of disk space you need depending on
- the plan you choose
- how large your website is.
Not having enough disk space means that you are not able to update your website, and website performance could be impacted. With the Business and Executive Internet presence plans Atcom Host actively monitors your disk space and changes it as need arises.
For an .au zone domain name (.com.au or .net.au) you will need to:
- be a commercial entity
- have either an Australian Company Number (ACN) or Australian Business Number (ABN).
There are several records that are used to setup and secure your email services.
A mail exchange record (MX record) is a resource record or settings within the Domain Name System (DNS) that redirects email to a specified mail server that accepts email on behalf of a domain or users. Within an MX record you can set routing priorities using preference values for which mail server will be used if there are multiple servers.
www.techopedia.com/definition/1685/mail-exchange-record
 Sender Policy Framework (SPF) records allow domain owners to publish a list of IP addresses or subnets that are authorized to send email on their behalf.
mxtoolbox.com/spf.aspx
Domain-based Message Authentication, reporting and Conformance record controls what happens if a message fails authentication. It tells a server to either Quarantine or reject the message or allow the message to be delivered. It also sends a report to an email address/es with data about all messages seen from the domain.
Editing these records and keeping them up to date allows Atcom Host to prevent your domain from being used for spam and spam being sent to your domain. These records also add to your online reputation. These records also work with your unique domain key as well.
DNS stands for Domain Name System. It is responsible for the allocation and direction of traffic for domain names based on the web address in the browser.
For visitor’s to see your website through your domain, they need to be connected. Pointing is adding your website IP address to your domain records on your domain host allows this to happen. When making changes like moving your website to a new host server be aware that it takes time for the internet to be aware of the move. This is called propagation.
When you register a domain name the information inputted is freely available through the WHOIS service. Domain Privacy Protection is used to protect your domain and yourself from Identity Theft, Illegal commercial emailing, unwanted phone calls, spam / junk emails as well as protecting your information from your competitors. Domain Privacy Protection means that your publicly available information will not be published and measures are put in place.
Spam can be defined as:
Spam can come over any digital or electronic messaging service.
Be this by mobile (phone calls or text messages) social media or email.
Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.
How to Recognise Spam
There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.
How do I protect myself
The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:
- The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
- Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
- Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
- Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.
Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.
Web Hosting is where you website lives. It is usually with a hosting service provider.
Atcom Host provides web hosting for clients who need it, depending on the plan they purchase:
Bandwidth is the measurement of data being transmitted through the web server. High traffic on a website means that it needs more bandwidth. Bandwidth also dictates how many visitors your website can handle during any given time period.
Getting Started
A content management system (cms) is a tool that helps you build a website without needing to write all the code from scratch (or even know how to code at all).
Our CMS of choice is WordPress, although we have clients who prefer using a different CMS.
Our reasons for using WordPress have been outlined here.
Spam can be defined as:
Spam can come over any digital or electronic messaging service.
Be this by mobile (phone calls or text messages) social media or email.
Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.
How to Recognise Spam
There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.
How do I protect myself
The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:
- The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
- Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
- Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
- Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.
Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.
Web Hosting is where you website lives. It is usually with a hosting service provider.
Atcom Host provides web hosting for clients who need it, depending on the plan they purchase:
Security
It is extremely important to have your website backed up regularly. The website backup means that you can have a similar copy of your content and data with you. You can keep it safe. Whatever happens to your website, the data will be available to you, and you can use it later. The top 10 reasons for needing a backup are:
- Guarding against human-error
- Reverse Problems During Updates
- Preventing Data loss
- Capability issues after new installations
- Fix malware infections
- Maintain Hacker Protection
- Enabling easy Site Migration
- Testing a new version of your website
- Having your revenue stream not interrupted
- Making sure you have strong Security Practices.
There are several records that are used to setup and secure your email services.
A mail exchange record (MX record) is a resource record or settings within the Domain Name System (DNS) that redirects email to a specified mail server that accepts email on behalf of a domain or users. Within an MX record you can set routing priorities using preference values for which mail server will be used if there are multiple servers.
www.techopedia.com/definition/1685/mail-exchange-record
 Sender Policy Framework (SPF) records allow domain owners to publish a list of IP addresses or subnets that are authorized to send email on their behalf.
mxtoolbox.com/spf.aspx
Domain-based Message Authentication, reporting and Conformance record controls what happens if a message fails authentication. It tells a server to either Quarantine or reject the message or allow the message to be delivered. It also sends a report to an email address/es with data about all messages seen from the domain.
Editing these records and keeping them up to date allows Atcom Host to prevent your domain from being used for spam and spam being sent to your domain. These records also add to your online reputation. These records also work with your unique domain key as well.
Secure lock down means that your WordPress site is hardened against know vulnerabilities. These vulnerabilities often happen when the core of WordPress is not updated, poor system administration, plugins and themes that have been modified/hacked to allow collection of data or cause harm to your site in some way. Because of this people often assume WordPress is not secure.
Fundamentally, security is not about perfectly secure systems. Such a thing might well be impractical, or impossible to find and/or maintain. What security is though is risk reduction, not risk elimination. It’s about employing all the appropriate controls available to you, within reason, that allow you to improve your overall posture reducing the odds of making yourself a target, subsequently getting hacked. – WordPress Security Codex
The above quote embodies what we here at atcomHost do so that your site can be as secure as it can be against
- Backdoors
- Pharma Hacks
- Brute-force Login Attempts
- Malicious Redirects
- Cross-site Scripting (XSS)
- Denial of Service
When you register a domain name the information inputted is freely available through the WHOIS service. Domain Privacy Protection is used to protect your domain and yourself from Identity Theft, Illegal commercial emailing, unwanted phone calls, spam / junk emails as well as protecting your information from your competitors. Domain Privacy Protection means that your publicly available information will not be published and measures are put in place.
Spam can be defined as:
Spam can come over any digital or electronic messaging service.
Be this by mobile (phone calls or text messages) social media or email.
Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.
How to Recognise Spam
There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.
How do I protect myself
The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:
- The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
- Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
- Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
- Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.
Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.
An security certificate is also called a SSL Certificate. When a site has an SSL Certificate the web address (URL) is prefixed with HTTPS instead of HTTP. In 2018 Google made a decision to add SSL to the ranking algorithm it uses as a mandatory item. This has meant that websites have needed a SSL Certificate to help with Search Engine Optimisation.
Apart form helping with your Search Engine Rankings having a Security Certificate also helps with:
- Protecting your data on your website
- Your website Identity is authenticated
- Helps with accepting online payments
- Improves customer trust.