FAQ- Security

Legacy Content

This is Legacy Content. For up-to-date tutorials and information, see our current knowledge base.







Commerce Pro

High Volume

What steps do you take to secure your network and servers?

Our FreeBSD Unix and Ubuntu Linux servers are extensively hardened and tested against security exploits. All unnecessary services are disabled, all security patches are up-to-date, and servers are audited regularly for attempted break-ins. Our systems administrators actively maintain awareness of new security developments, and as Open Source systems, FreeBSD and Ubuntu are easy to update with new protections.

Our network is overbuilt with spare capacity and redundancy. Our custom network monitoring systems ensure that attacks and other anomalies are identified and responded to promptly.

How can I access my account securely?

If you are logging in by FTP, or accessing a mailbox by POP3 or IMAP, your password is traveling across the internet in "plaintext," which means that it can be intercepted at your Internet Service Provider (ISP), or intervening networks, and subsequently used by a third party to access your account.

To log into your account securely, please use SSH (Secure Shell), SFTP, POPS, or IMAPS. These access methods use public-key encryption to ensure that your connection cannot be intercepted or replayed.

Access through Account Control Center is always secure.

How can I choose an effective password?

Every password should be chosen with the following guidelines in mind. Do not ever assume that no one would want to break into your account. Compromised accounts are very effective camouflage for system crackers, vandals, Spammers, etc. We provide tips on choosing an effective password in our Changing Your Password article.

Updated on April 24, 2019

Was this article helpful?

Related Articles