Secure Hosting

Why You Need Secure Hosting

Jonesen TeamIndustry Insights

Share this Post

It’s official – Google has announced that their Chrome browser will be marking HTTP sites accepting passwords and credit card as “non-secure” starting January 2017. However, their plan doesn’t stop there. Eventually, Google will have their Chrome browser to mark all HTTP sites as “Not Secure” – complete with a red warning triangle right in the browser. With these upcoming changes, having secure hosting becomes even more important to succeeding online.

What’s The Big Deal?

Most people don’t realize the difference between a HTTP and HTTPS site. Currently, Chrome distinguishes HTTPS sites with a “secure” icon. HTTP sites have traditionally been left with no distinction or neutral indicators. Studies have shown that most website visitors don’t interpret a missing “secure” icon as a warning. And this in itself is the “big deal” moving forward without a proper SSL certificate – users won’t just have a missing “secure” icon but instead will be faced with a clear “Not Secure” warning.

What is Secure Hosting?

With the upcoming changes Google is implementing, making sure you have reliable, secure hosting is critical. Below are five things to consider when comparing hosting options:

SSL Certificate
As mentioned earlier, you will need to make sure you have a SSL certificate installed on your site to avoid being marked by Chrome as “Not Secure” moving forward. In addition to the privacy and security considerations of making your site HTTPS, there are also documented SEO advantages for making the switch.

Regular Software Updates
It’s no secret that a large number of security breaches happen through outdated software. Developers are constantly patching holes and fixing security issues in their products so remaining several versions behind is a recipe for disaster. Most hosting companies will leave the software updates to you whether you are technically capable or not!

Brute Force Protection
One of the most common techniques used by hackers is the brute force attacks. This is where a hacker will try to compromise your site by trying different logins repeatedly until they eventually get your password and gain access. Protect your site by limiting failed attempts and the blocking repeat offenders.

Reverse Proxy
Using a reverse proxy on your site puts a layer of protection between the internet and your site. By running all traffic through the proxy, you can filter out potential threats before they even get to your site.

Web Application Firewall
Web application firewalls (WAF) exist to protect your site against the most common vulnerabilities. From SQL injection attacks to cross site scripting, a strong WAF can help keep your site secure from the majority of today’s top vulnerabilities.

Get Protected Today

Here at Jonesen, we’re proud to offer fast, reliable, and secure hosting. We offer a number of hosting stacks that can provide the level of protection that you need to be successful online. Don’t let Google mark your site as “Not Secure” – contact us today to get secured today!

Share this Post