Security Measures

Gecko Surfing uses HostGator, an award winning a large USA hosting facility provider. Hostgator has a number of security measures to protect its servers and to prevent our accounts from being compromised via the server itself. 

  • Hostgator is protected from DDoS attack (UDP flood). It has an extensive custom firewall rule and large mod_security rulesets protecting its servers from a variety of forms of attack.
  •  Datacenters are all highly secure facilities with restricted access.
  • Hostgators other server security methods and precautions are confidential.
Software Exploits

Security breaches of websites and personal accounts due to vulnerable passwords or known exploits in the software are the responsibility of Gecko Surfing. We make it our business to be knowedgeable and familiar with common forms of attacks, and work to ensure our accounts are secure against preventable attacks and are prepared to recover from the compromises that catch us by surprise.

The vast majority of account compromises are caused by malicious users who have found exploits in scripts. Part of our service is to ensure we can offer is to make sure that all WordPress installations, as well as any related themes, plugins and other add-ons, are kept up-to-date. 

Update Passwords 

Another common form of compromise is due to exploited passwords. These compromises can occur in one of two ways: a brute force compromise or through virus/malware on a local computer.

 
Brute Force Compromise
In a brute force compromise, the attacker will repeatedly guess the password until the correct combination is guessed. While Hostgator servers do have certain amounts of brute force protection enabled, it is best to create complex password made up of at least three of the four major character types.

  • Uppercase Letters (A-Z)
  • Lowercase Letters (a-z)
  • Numbers  (0-9)
  • Special characters (-_.,!@#$%^&*)

When updating passwords, we also suggest that you do not use previously used passwords.

Viruses and Malware on local PC's tablets and mobiles

Another form of password compromise occurs when account passwords are stolen using viruses/malware located on local computers from which accounts are accessed. In order to protect against this form of attack, full virus and malware scans should be run on all computer sand , tablets  which access the account to ensure that they are clean. Depending on your operating system, there are plenty of options to choose from regarding PC virus scanning. 

 
Backups

All websites are backed up regularly by GeckoSurfing as agreed with our clients.