Here at IF Consultancy, we understand that choosing the right website Management Plans can sometimes be very overwhelming. So rather than baffle you with numerous options and terminology that will make you weary, we have decided to just offer 3 types of website Management Plans.
Are you a registered charity? Then please contact us to discuss the special rates of our Management Plans specifically for registered charities.
I have more than one site I want to host with you. Do I get a discount on the Management Plans? Ha ha, you’re in luck. We offer a discount for multiple sites on the same Management Plan. Please contact us for more information.
[supsystic-price-table id=8]
(1) –
in hours only, priority will be given to clients on Advanced or Premium packages
Still unsure which web hosting package is right for you?
For further help with website hosting packages, please call us on
0161 427 9911. We will be happy to answer any questions you may have.
Our aim is to help you find the most suitable hosting package for your online presence.
Advanced & Premium Management Plans
The threat of infection or a security incident is constant. If you don’t know what is happening, how can you appropriately respond.
The idea of a website or environment that is immune from security issues is false. The ability to detect when incidents occur is fundamental to the establishment of a good security posture for your website.
We use
Sucuri protection to protect our sites. If you choose the Advanced or Premium Management Plan you will have the added security that by displaying the “protected by Sucuri seal” on your website your customers will know you take your safety and theirs seriously and that they can use your site safely without risk of malware or viruses infecting their computer.
The suite of protection includes:
– Malware Detection – Continuous Security Monitoring Your website will be continually monitored remotely for on page and server hacks, blacklist and WHOIS monitoring, DNS changes and SSL monitoring ( if relevant). We also will receive an immediate alert by email, text and twitter if your website has in anyway been compromised and will immediately be able to remove the malware in many cases before your site is compromised and your customers notice.
– Malware Removal – Website Hack Repair Removal of malware from your site, guaranteed. Availability 24/7/365 and almost all sites fixed within 4 hours. Every person is trained in remediation. When new infections springs up, it’s all hands on deck. -with a globally distributed network of dedicated security researchers and remediation experts.
– Blacklist Removal – repair your google rankings Google alone blacklists 10,000 websites every day. With over 100 blacklisting authorities, that means a lot of websites are being blocked for serving malicious content. When a website is blacklisted, it loses nearly 95% of organic traffic, causing serious risks to your business and it’s brand.
Maintaining your website integrity and reputation is a big responsibility. Blacklisting authorities feel the same way about protecting their users. They will quickly flag your website if they have evidence that it could be harmful. This is most often a malicious payload hidden on your website that could infect visitors, including executable files, trojan horses, phishing schemes, Pharma hacks, and information scrapers. Most of the time, the website owner is not aware that they had been hacked until it is too late.
We remove your website from the blacklist quickly, but that’s not all we do. We continually monitor your website so that if you are ever blacklisted again, you will be the first to know. Your plan includes unlimited cleanup requests, meaning we will always be here to get the job done.
[toggle title=’Click for more details on website security’]
Firewall
A firewall is a software program or hardware device that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, network, or server, depending on your firewall settings. A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your webserver through a network or the Internet. A firewall can also help stop your webserver from sending malicious software to other computers and servers. A firewall isn’t the same thing as an antivirus program. To help protect your webserver, you need both a firewall and an antivirus and anti-malware program.
Hacking
Hacking is when content is placed on your site without your permission as a result of vulnerabilities in your site’s security.
Hacking occurs when someone gains unauthorised access to a part of your webserver with write access. This can be through code, stolen passwords, or through someone else’s site on a shared server. Defacement is one result of a hack – just because you have fixed the defacement doesn’t mean you have fixed the actual hack. Almost all attacks are automated or begin in an automated fashion. Automated scans use databases of known exploits and techniques against websites.
Malware
This is one of the most common issues where the webserver is infected with malware, key-loggers, or spyware. The result of this is to enable the hacker to steal passwords and login information or to be able to attack the website while the user is accessing sensitive areas.
Directory Traversal/ Local File Inclusion (LFI)
Directory traversal is one of the most common attacks occurring today. It causes your web application to access a file or program located in another directory that should not be accessible or exposed publically. LFI is similar to Remote File Inclusion (RFI) except the file is located on the same server. In this case, the attack is used to gain access to sensitive data such as password files etc.
SQL Injection (SQLI)
SQLI uses parameters to run SQL statements via your webpages. The SQL statements could be used to dump the contents of a database or to view data such as User IDs, or to manipulate data in the database. This is one of the more common attacks.
Cross-Site Scripting (XSS)
Cross Site Scripting targets the scripts embedded in a webpage that are executed client-side on your browser such as Javascript, VBScript, Activex, HTML, Flash etc. The injected code/scripts can then be used to send malicious code to the user or to steal information from the user rather than from the website or database itself. A lot of websites are vulnerable to this type of hacking.
Remote File Inclusion (RFI)
RFI tricks existing software on your webpage to access malicious code elsewhere on the internet and to execute it with privileges.
Defacing or Defacement
Defacement is a substitution of a web page (or part of a page) by hackers. Defacement is the online equivalent of graffiti.
Distributed Denial of Service (DDOS)
DDOS is a type of attack on a website hosting server that is designed to cause the website hosting server to stop users accessing websites by flooding it with useless traffic. Many DDOS attacks exploit limitations in the communications protocols used to connect hosts on the internet. For all known DDOS attacks, there are software fixes that system administrators can install to limit the damage caused. But, like malware, new DDOS attacks are constantly being dreamed up by hackers.
The information contained in this publication was correct at the time of going to print. In the interest of continuous improvement of the services we offer, we reserve the right to change the details within this publication at any time without notice or obligation. No part of this publication may be reproduced, transmitted, stored in a retrieval system or translated into any language in any form by any means without our written permission.
[/toggle]