The impact of an email compromise on your business
It only takes one rogue email to bring down your entire business. Learn how to protect yourself against email compromise attacks
It only takes one rogue email to bring down your entire business. Learn how to protect yourself against email compromise attacks
We show you how to use SSH keys, hosts.allow files, ports, fail2ban, permissions, updates, and tools to secure Linux servers.
Where to find the hidden file in cPanel, how to create it & add code. Configure custom error pages, URL redirects, and more.
This quick guide will take you through the steps to creating your plans and adding additional storage locations for your Acronis Backup reseller account.
This Acronis installation guide will take you through all of the steps to get Acronis installed on your Windows or Linux devices.
We've temporarily disabled Horde mail client on all shared and managed cPanel servers because of a serious security vulnerability.
Temporarily disable your anti-virus, test emails, re-enable anti-virus, whitelist Outlook for ESET, Bitdefender, AVG, Avira, Avast.
Website and online security should be at the forefront of any avid internet users' mind. Learn the risks and safety protocols of surfing the web.
Restoring lost information can be a breeze if you have a backup. Don't put it off any longer. Secure your data and learn how to backup.