Security

With today's cybercrime including ransomware, phishing attacks, DDoS attacks, credential-stuffing and more, secure hosting for your infrastructure and data is integral. Find out what you need to stay vigilant and safe.

  • Private Cloud Powered By VMware and NetApp Offers Scalability and Performance

    Private Cloud Powered By VMware and NetApp Offers Scalability and Performance

    Private Cloud powered by VMware and NetApp delivers all the benefits of a traditional public cloud with the power, performance, and security of an isolated infrastructure on dedicated hardware.

    Read eBook
  • Liquid Web's Private Cloud by VMware Offers Incredible Scalability and Performance

    Liquid Web's Private Cloud by VMware Offers Incredible Scalability and Performance

    Private Cloud powered by VMware and NetApp delivers all the benefits of a traditional public cloud with the power, performance, and security of an isolated infrastructure on dedicated hardware.

    Read eBook
  • Cloud Sites PHP 7.3 Update

    Cloud Sites PHP 7.3 Update

    Liquid Web is excited to introduce the newest version of PHP 7.3 for all Cloud Sites customers starting on April 3rd, 2019. The upgrade to PHP will bring better performance, improved security, and...

    Read Article
  • Explore Our 2018 SMB Data Loss Statistics

    See the Numbers
  • Liquid Web Partners With VMware to Offer a Flexible, Secure, Scalable Managed Private Cloud

    Liquid Web Partners With VMware to Offer a Flexible, Secure, Scalable Managed Private Cloud

    LANSING, Mich., January 29th, 2019 — Liquid Web, LLC, (www.liquidweb.com), the market leader in managed hosting and managed application services to SMBs and web professionals, is pleased to...

    Read Article
  • What are the Top Five Security Best Practices for 2019?

    What are the Top Five Security Best Practices for 2019?

    Here are the top five essential security best practices every small to medium-sized business needs to be implementing and monitoring in 2019.

    Read Article
  • PHP 7.1 and 7.2 – Embracing the Latest and Best in Cloud Sites Technology

    PHP 7.1 and 7.2 – Embracing the Latest and Best in Cloud Sites Technology

    Here at Liquid Web, we are excited to announce the introduction of PHP versions 7.1 and 7.2 into the Cloud Sites technology suite.  You can now create websites using these frameworks through your...

    Read Article
  • April 24 2017 Release Details - (Control-Layer: IPAPI)

    April 24 2017 Release Details - (Control-Layer: IPAPI)

    New release details for our Cloud Sites, including SSL Intermediate Chain Validation introduction, MediaWiki Base code for testing, and IIS tech change.

    Read Article
  • “Human contact, reliability, and security” - One World Hosting Case Study

    “Human contact, reliability, and security” - One World Hosting Case Study

    One World Hosting needed the ability to provide secure, high-availability hosting to its customers, even through sudden traffic spikes. Liquid Web came through with reliable responsive service.

    Read eBook
  • How WordPress Sites Get Hacked (For Non-Techies)

    How WordPress Sites Get Hacked (For Non-Techies)

    You probably heard that WordPress sites get hacked every now and then. We give you the four top vulnerabilities that hackers look for and how to fix them.

    Read Article
  • 2018 SMB Data Loss Statistics

    2018 SMB Data Loss Statistics

    In 2018, many SMBs were affected by malicious attacks such as ransomware infections, which resulted in monetary and data loss. Discover how to protect yourself with a backup solution from Liquid Web.

    Read eBook
  • For the 12th Time, Liquid Web is Honored as an Inc. 5000 Fastest-Growing U.S. Company

    For the 12th Time, Liquid Web is Honored as an Inc. 5000 Fastest-Growing U.S. Company

    Liquid Web, LLC, has been selected for the Inc. 5000 Fastest-Growing US companies award for the 12th time in a row, among only 33 other companies.

    Read Article
  • Women in Technology: Rhonda Capone

    Women in Technology: Rhonda Capone

    Liquid Web’s Head of Strategic Initiatives on being present at the start of brand new technology, her father’s lasting influence on her career, and the value of Servant Leadership. Rhonda Capone...

    Read Article
  • Quick Guide to Best Practice for Data Backup

    Quick Guide to Best Practice for Data Backup

    The only way to fully protect yourself is to regularly backup your data so you can fully recover in the event of a disaster. Here are the top six best practices for data backup.

    Read Article
  • Hardware Firewalls: An Overview of Benefits and How They Keep You Secure

    Hardware Firewalls: An Overview of Benefits and How They Keep You Secure

    Trying to keep your data and your servers secure and want to know more about what hardware firewalls are and how they can help?

    Read Article
  • Liquid Web Is Selected as a Top Security Solution Provider by Healthcare Tech Outlook

    Liquid Web Is Selected as a Top Security Solution Provider by Healthcare Tech Outlook

    Liquid Web is honored to be named in the Top 10 Healthcare Security Solution Providers for 2019 by Healthcare Tech Outlook.

    Read Article
  • 5 Tips to Identify Dangerous Spam Emails

    5 Tips to Identify Dangerous Spam Emails

    Follow Liquid Web's 5 tips to identify dangerous spam emails and protect your inbox from malware, virus, and phishing attacks.

    Read Article
  • Secure Your Mission Critical Workloads with a Managed Firewall

    Secure Your Mission Critical Workloads with a Managed Firewall

    Every day the number of security threats expands, and so does the complex nature of these attacks. A Managed Firewall can help as your first line of defense against malicious internet traffic.

    Read eBook
  • What is a Data Breach?

    What is a Data Breach?

    A data breach happens when an unauthorized party gains access to sensitive or private data. Some examples of sensitive data include passwords, financial records, database info, or HIPAA records.

    Read Article
  • Data Backup and Disaster Recovery

    Data Backup and Disaster Recovery

    Good business relies on good planning, and there may be nothing more important than planning for a backup and disaster recovery scenario for your business. Here is your guide for building a plan.

    Read Article
  • What is a DDoS Attack?

    What is a DDoS Attack?

    A Distributed Denial of Service (DDoS/DDOS) attack is an attempt to render your server unreachable and generally follows one of two major types, Volumetric or Service-Level. Find out how to stay safe.

    Read Article
  • loading
    Loading More...