Register New Domain Extensions

Website Security and CDN support for your website or blog

Proactively secure your site. Malware scan and removal . CDN performance accelerator.

Website Security scans your website to find malicious software (malware) before it can harm you or your customers. Hackers insert malware onto legitimate websites in order to steal customer passwords and credit card numbers, deface or destroy the website or use your server to launch attacks on other websites.

Google will blacklist sites that could be considered dangerous to visitors, which makes it nearly impossible for people to find you. We identify and resolve any blacklisting issues, so there’s no interruption to your business.

As opposed to simply scanning for malware that may have already infected your site, our Web Application Firewall (WAF) provides around-the-clock, proactive protection to block malware from ever reaching your website.

By using Website Security Deluxe or Website Security Express you can proactively secure your site (Malware scan and removal + ongoing protection) and use our CDN performance accelerator. Our Content Delivery Network (CDN) stores your content on multiple servers around the world, which means visitors connect to servers that are physically closer to them. This speeds up your website’s performance by at least 50%.

Daily scans root out bugs

We notify you as soon as we find any of the following problems:

  • Search engine/Browser blacklisting
  • Spam blacklisting
  • Application vulnerabilities, including SQLi & XSS
  • Bot visits
  • Suspicious or malicious traffic to your site
  • Backdoors left by hackers

Our SMART tool takes out the trash. Automatically removes malware and back-end files to keep your site from being disabled or blacklisted by search engines.

Website Security Advanced

$17.99 per month

Proactively secure your site. Malware scan and removal + ongoing protection.

  • Protects one website
  • Firewall prevents hackers
  • SSL certificate included in firewall
  • Malware scanning
  • Unlimited site cleanups
  • DDoS protection, and Content Delivery Network (CDN) speed boost
  • 25 GB of secure backup

Website Security Premium

$26.99 per month

Fix my hacked site now. Expedited malware removal + ongoing protection.

  • Protects one website
  • Firewall prevents hackers
  • SSL certificate included in firewall
  • Malware scanning
  • Unlimited site cleanups
  • DDoS protection, and Content Delivery Network (CDN) speed boost
  • Prioritized cleanup and repair
  • 200 GB of secure backup

Website Security Standard

$5.99 per month

Detect and remove malware. Malware scan and removal. NO CDN SUPPORT

  • Protects one website
  • Firewall prevents hackers
  • SSL certificate included in firewall
  • Malware scanning
  • Annual site cleanup and remediation

About content delivery network (CDN)

A content delivery network, or content distribution network (CDN), is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance by distributing the service spatially relative to end users. CDNs came into existence in the late 1990s as a means for alleviating the performance bottlenecks of the Internet, even as the Internet was starting to become a mission-critical medium for people and enterprises. Since then, CDNs have grown to serve a large portion of the Internet content today, including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social media sites.

CDNs are a layer in the internet ecosystem. Content owners such as media companies and e-commerce vendors pay CDN operators to deliver their content to their end users. In turn, a CDN pays Internet service providers (ISPs), carriers, and network operators for hosting its servers in their data centers.

CDN is an umbrella term spanning different types of content delivery services: video streaming, software downloads, web and mobile content acceleration, licensed/managed CDN, transparent caching, and services to measure CDN performance, load balancing, Multi CDN switching and analytics and cloud intelligence. CDN vendors may cross over into other industries like security, with DDoS protection and web application firewalls (WAF), and WAN optimization.(Excerpted from Wikipedia).

“Spend time upfront to invest in systems and processes to make long-term growth sustainable.”-Jeff Platt. Invest in long-term initiatives for the benefit of your small business as you scale.

Top 10 Online Threats To Your Website Security

  • 1. Injection: It’s not uncommon for web applications to have injection flaws, especially SQL injection flaws. A hacker who finds one will send malicious data as part of a command or query. The attacker’s message tricks the app into changing data or executing a command it was not designed to obey.
  • 2. Cross-site Scripting: Cross-site Scripting flaws occur whenever an application sends user-supplied data to a web browser without validating it first. Hackers use these flaws to hijack users away from the site or deface it, thereby costing the site owner in lost business.
  • 3. Insecure Direct Object References: Applications that lack checks to verify a user is authorized to view particular content can be manipulated to access private data.
  • 4. Broken Authentication: When account credentials and session tokens aren’t properly protected, hackers can assume users’ identities online.
  • 5. Cross-site Request Forgery (CSRF): A CSRF attack tricks unknowing site visitors into submitting forged HTTP requests via image tags, XSS, or other techniques. If the user is logged in, the attack succeeds.
  • 6. Security Misconfiguration: Security misconfiguration flaws give hackers unauthorized access to system data via default accounts, unused pages, unpatched flaws, unprotected files and directories.
  • 7. Insecure Cryptographic Storage: Many web applications don’t do enough to protect sensitive data such as credit card numbers, Social Security numbers and login credentials . Thieves may use this data for identity theft, credit card fraud or other crimes.
  • 8. Failure to Restrict URL Access: Often an app will protect sensitive interactions by not showing links or URLs to unauthorized users. Attackers use this weakness to access those URLs directly in order to carry out unauthorized actions.
  • 9. Insufficient Transport Layer Protection: Applications often fail to authenticate, encrypt and protect the confidentiality of network traffic. Some use weak algorithms, expired or invalid certificates or use them incorrectly. This allows hackers to “eavesdrop” on online exchanges. An SSL Certificate typically neutralizes this threat.
  • 10. Invalidated Redirects & Forwards: Web applications often redirect or forward legitimate users to other pages and websites, using insecure data to determine the destination. Attackers use this weakness to redirect victims to phishing or malware sites, or use forwards to open private pages.