Skip to Content
 
Call Toll-Free 877-426-8849
 

Website Security

All content related to securing websites from hacker prevention to corrupted file treatment.

Website Security Isn’t an Option

website hosting and secuirty

Since 2014, Google has been encouraging website owners to use HTTPS.  So what is HTTPS?  HTTP is Hypertext Transfer Protocol and is the technology that passes information for websites across the Internet.  HTTPS is the secure version of HTTP and uses an SSL Certificate to encrypt the traffic, which is a good first step in website security.  When a website uses HTTPS the data is protected from hackers viewing the traffic.  Sensitive data such as credit cards can then be passed across the Internet securely.  

Using HTTPS correctly will give your website a boost in the search engine ranking.  Many marketing companies have caught onto this and have started using HTTPS.  Now Google is moving from carrot to stick.  When Chrome version 62 comes out in October websites with text input will require an SSL certificate.  If you don’t have HTTPS then Chrome will display a “Not Secure” warning in the address bar. In addition, to this Google has already started to blacklist websites that allow password and credit card fields without using HTTPS.

We have run across many websites that fail at HTTPS.  Registrars and hosting companies offer SSL certificates but don’t provide assistance with implementing the certificates correctly.  There are three aspects of proper HTTPS implementation.  First, you must purchase a certificate and have it installed on the hosting server.  This can be tedious and require the process to be repeated annually.  Remembering when the certificate expires and renewing it is frustrating.

Second, the website must redirect all traffic to HTTPS.  A certificate without this step is useless and many website owners fall prey to clever marketing that provides a certificate but no implementation.  This redirect can be done many different ways.  All pages should be permanently redirected so that the SEO value transfers correctly.

Third, the code may need to be adjusted as a result of mixed content errors.  Mixed content is when an image is using HTTP and the web page is using HTTPS.  Because one is secure and the other is not this creates a mixed content error.  All assets such as images, CSS, and javascript must use HTTPS if the web page is using HTTPS.  This is especially important with WordPress websites.  

Anttix utilizes webClinic Pro for website hosting and website security.  Our customers enjoy proper implementation as part of the service.  You don’t need to worry about figuring out how to make your website secure, all of this implemented for you and reviewed regularly to ensure that your website stays secure.
 

Category:
 

Tips For Avoiding Spam

Padlock

Though filters deal with spam once it targets your account, avoiding it in the first place is even better. Here are five simple ways you can reduce unwanted email:

  1. Don't post your email address on the internet. Programs called 'spiders' continually crawl the Internet for email addresses to add to spam lists.
  2. Do an internet search for your email address. Type your email address into a search engine such as Google or Yahoo!. If any results appear, then your email address is visible, and thusly, spammable.
  3. If you need to have an email address visible, use an email address other than your direct email address. Set up two addresses. Use one for form submissions/registrations, and the other for your actual email. Don't give out the primary address unless absolutely necessary.
  4. Never respond to spam. Most of the time the reply address is fake. On the rare chance that it isn't fake, the spammer might be monitoring responses. If he receives a reply, then he knows that the account is active, and he will continue to send spam. Ironically, your earnest attempt to be removed from a spammer's list may just ensure that you remain on the list.
  5. Never click on links in spam messages. These links are often formulated in such a way as to verify that the email account is active. You want the spammer to think that your email account is no longer active.
Category:
 
Tags:
 

Managing A Vulnerable Website

website security

In the recent years we are noticing more and more just how aggressive hackers can be. With the many large institutions getting compromised every day this creates fear but it lacks understanding for website owners who are not sure what to do and whether or not they are vulnerable to these same attacks. This article explores both those questions and a few more when it comes to the vulnerability of your website.

First, let’s answer the simple question of whether your website is vulnerable. The simple, scary truth is yes, it is. No matter how big or small or you are, or how secure your server and site are, there is still a chance your site can be hacked. Hackers don’t just use one method to attack sites, they try several different routes and one just might fail and let them in. They do not always single out sites for attack either, more often attacks occur across several sites at once as a blanket attack. In some cases the hackers simply find a way in and plant a seed, such as an account or virus, to use later to exploit the site. This is not meant to scare you, but just to face the simple reality that any site can be vulnerable at any time so it’s better to be safe than sorry.

Second, the question becomes what to do to prevent an attack. The best steps include the following:

Secure your site with SSL encryption

This should be standard for all eCommerce sites and those that collect sensitive data, but even basic sites can benefit with some sort of encryption.

Implement Spam Protection

Besides run of the mill spam acting as unwanted advertising and backlinks, spam can be used maliciously to plant viruses and backdoors into a site. Protection against spam can block most if not all of this unnecessary and malicious email.

Update Your Site Software

Unless your site is built with raw HTML files, chances are your content is managed by a CMS package like Wordpress, Joomla, or Drupal. If so, this software should be updated as often as possible and every single time a security alert pops up. The developers and communities responsible for these site software packages implement new security fixes every day in response to potential threats. Speak with your web developer about the last time your site software is updated and whether an update is in order.

Acquire Protection Services

This is often provided as a service from your web host or web developer service by means of a protection plan. Some cost may be involved, but having a team ready and able to fix any problem that may occur with a compromised site can be invaluable.
The bottom line is the only person responsible for your site after an attack is you, the site owner. Hosting companies and web developers can only help, but fixing the problem falls on your shoulders. When you realize that you are liable for the information, sometimes sensitive, on your site becoming compromised you will know it is time to be preemptive before it’s too late.

For questions or concerns about the security of your website, contact Anttix today at (877) 426-8849 or click here to contact us.

Category:
 

Security Update: BadUSB

Computer Security

We all know we can get viruses and malware from various websites and shady emails, but did you know an untrustworthy USB device can do far more harm? The latest technology threat comes in small packages, such as USB storage, charging stations, and peripherals. An insecure USB device plugged into your computer, laptop, or phone can quickly corrupt your computer or device beyond repair. That doesn't mean a simple trip to a computer repair service or software update will fix your problem. That means your entire computer may just have to be thrown out. These bad devices are referred to as BadUSB.BadUSB Device

This scary truth is due to USB devices having no protection against reprogramming, allowing any number of compromising attacks. For example, a USB device can be programmed to simulate a keyboard and type commands into a person's computer. It may also be programmed to mimic a network device and redirect the traffic from that machine. It may also carry a virus that simply infects the computer on boot-up and write itself to the very core of the system. All of these scenarios are quite malicious and very damaging. Nowadays USB devices are plentiful, affordable, and quite accessible making the threat that much greater.

So how do you protect yourself from BadUSB? For starters, never plug an unknown device into your computer or device unless you know its source. Avoid untrustworthy charging stations, free USB storage devices, and unfamiliar peripheral devices. Use only devices you purchased new or have been using on only your devices for some time. For the most part, technology has some catching up to do so you should be seeing new, secure USB hitting the market with hardware preventing reprogramming of the device. As these versions of the devices you know become more readily available the threat will lessen and you can rest a bit easier. For now, be cautious and for more information please feel free to contact Anttix toll-free at 877-426-8849 or click here to contact us by email.

Category:
 
Tags:
 

Head in the Cloud

Cloud Computing

Those of us who do important work, for both the household and the workplace, on a computer know the importance our files can hold. They might be our finances, our school work, or simply the Christmas shopping list all planned out. Either way, we hope to protect them and keep them from corruption as much as we can. Since the early days of home computing we relied on removable disks and drives (remember the Zip Drive?) to backup and store our files to protect against computer crashes and viruses that may corrupt them. Small and large businesses may take this process further, installing local networks with hard drive storage for all the companies’ important files from personnel records to client documents. These systems are generally bulky and require maintenance and in-house personnel to maintain. So with today's technology how do we easily and securely manage our files? Maybe the answer is in the clouds.

We hear the term "in the cloud" thrown around a lot these days. It may not really be defined well enough for us to understand. Cloud computing generally refers to several different servers strung together that provide as much storage and computing power as needed for any given service, and scales up and down as those needs change. Picture the clouds in the sky and imagine each one has certain amounts of storage and power. Then imagine your files and online services pulling in and connecting to as many of those clouds as it needs. That is what cloud computing simply is.

Now we will talk about "cloud storage" specifically and what it can mean for our file storing needs. There distinct advantages to cloud storage that may fit your needs so let us look at each one:

  • File Protection - Cloud storage comes with an added layer of protection for your files that your home computer may not provide. Frequent backups and monitoring occur on cloud storage services that you can't get with local storage
  • Low Cost - While flash drives and external storage can be pricey at times, cloud storage can come at little to no cost. Free services such as Google Drive and Dropbox have free options while the pay options can cost only $50 a year.
  • Free Space - Moving your local files from your local machine to cloud storage can clean up valuable free space giving your computer more power and performance.
  • Access - Cloud storage gives you the distinct advantage of accessing your files just about anywhere with an internet connection, whether it be on your Smartphone or tablet as well.
  • Sharing - Cloud storage usually gives you a simple and secure way to rapidly share your files with other people, including channels such as Facebook and Google+.
  • Collaborate - Some services such as Google Drive can give your team the advantage of collaborating on the same document, such as a shared presentation, to improve communication and teamwork within your office.

If some or all of these advantages sound like a good idea for you, it may be time to try cloud storage for your files and documents. If you would like to learn more and receive help with your business storage system call Anttix today at (877) 426-8849 or click here to contact us.

 

Category:
 
Tags:
 

The Fight for Net Neutrality

Net Neutrality

Recently Anttix posted an article from Gizmodo regarding the President’s request to the FCC to declare the Internet as a public utility, much like water and electricity. This is a grand stride towards Net Neutrality, something Anttix is passionate about in the field of web design and internet services. Net Neutrality is the principal that all Internet service providers (ISPs) should provide all data equally and not charge differently depending on subscribers and content providers. This week’s article will talk about what that means for the public and businesses in a bit more detail, and share why we are so adamantly for the principal of Net Neutrality.

Here are some concepts that Net Neutrality aims to prevent:

Bandwidth Throttling

Bandwidth throttling is when an ISP intentionally slows service depending on how much a content provider has paid them. Larger companies who pay more will have their services delivered to subscribers much faster while those who do not pay equally will find their subscribers much slower. The result: Smaller businesses will find their internet content fail to the larger companies who can afford the ISP’s fees. Users will not get the same experience for companies with similar products and services regardless of what they favor and who provides the best results.

Data Discrimination

Data discrimination, unlike bandwidth throttling, can prevent access to certain data, applications, and resources at the ISPs discretion. While in some cases this can be favorable, such as blocking illegal content and exploitation websites, it can be abused without Net Neutrality. Data discrimination without neutrality would allow ISPs to block content from subscribers who do not pay additional fees or sign upgraded contracts. For example, an ISP can use data discrimination to force users to pay a higher subscription fee for access to certain types of websites.

Search Bias

Search Bias is similar to the concepts above, with direct influence over search results. Search Neutrality, a piece of Net Neutrality, dictates results should only be sorted by relevance and not manipulated by paid bias. While companies like Google strive for relevance above all else other companies may take advantage of search bias if allowed to do so, giving you results on who paid for them rather than who provided relevant content. While sponsored links and paid ads are acceptable and very common, Net Neutrality protects the regular results themselves.

In conclusion, Anttix supports Net Neutrality to protect the experience users have on the Internet and prevent companies from forcing those who cannot pay more from having the same experience as everyone. Net Neutrality is for everyone, not just the users but companies, especially small businesses, who cannot afford to compete financially from large companies who can afford it. Ask yourself, how might Net Neutrality affect me? As an Internet user your online shopping and streaming media options will be greatly diverse and unbiased. As a business owner you will see fewer small business suffer online, monopolies prevented, and a decrease in capitalistic internet services. Supporting Net Neutrality will keep your Internet experience fair and unbiased as most of us want it to be.

If you would like more information please contact us toll-free at (877) 426-8849 or click here to contact us.

Category:
 
Tags:
 

Shorewood Web Design Firm Serious about Security

Website Security

In a recent Blog posting Google announced that they were getting serious about security.  

“Security is a top priority for Google. We invest a lot in making sure that our services use industry-leading security, like strong HTTPS encryption by default… We want to go even further. At Google I/O a few months ago, we called for “HTTPS everywhere” on the web.” http://googlewebmastercentral.blogspot.com/2014/08/https-as-ranking-signal.html

Remember in school when you would pass notes back and forth in class.  Often the note passed through many hands before reaching it’s destination.  The Internet is a lot like that.  Information from your website travels across the internet through many hands, so to speak, before reaching the user on the other end.  Most of the website information is passed as HTTP traffic, or unsecured traffic.  HTTPS is like putting your note in a lockbox, locking it with a key and passing it around the classroom to it’s destination.  Only you and the recipient have the key to open the safe.  This is most often used when making purchases online website, but is now encourage for all traffic.

In an effort to encourage webmasters and website owners to use HTTPS for all traffic, Google is giving a stronger signal to websites that use HTTPS.  Usually use of HTTPS is a “lightweight signal” and doesn’t have as much weight as content and backlinks.  However, Google is giving it a stronger weight now to encourage use.  This means that if you secure your entire website with HTTPS you’ll get better search engine rankings.  All of our Advanced Hosting packages come with CloudFlare service which provides an SSL Certificate and additional security.

Anttix, a Shorewood web design firm, is serious about security.  This year we have addressed the Heartbleed, Poodlebleed, and Drupal 7 vulnerabilities quickly.  You may have seen some of our previous correspondence about these vulnerabilities.  If you didn’t then here is what you need to know; we took care of it.  Now you can go back to working on your business without concern for your website security.

If you would like to upgrade your hosting or have questions about security please feel free to contact us.  Our website designers and developers like to talk about technology.  There is only so much that we can keep to ourselves here in Shorewood.

Category:
 
Tags:
 

Cyber Awareness - Update you Security

Security Tips

With the growing number of security attacks and identify theft cases in the U.S., being aware of what you can do to protect yourself and your website is very important. To do so we have a few tips you can follow to help lockdown your security and give yourself peace of mind.

  1. The broken record of security is to simply Update Your Passwords. We hear this all the time and for good reason. They are the first line of defense against hacking and identity theft. Just be sure to pick the right password. In the industry we refer to them as "Strong" passwords. These passwords are generally 8 characters in length, contain capital and lowercase letters, numbers, and even special characters like # and $. By mixing it up you can help make sure no one can simply guess or use sophisticated software to figure out what you password is even if its encoded in a database. To make the password easy to remember try common words with personal meaning to you, except replace some letters with numbers. You can replace the letter "i" with a 1, the letter "a" with a 4, the letter "o" with a 0, and the letter e with a "3". For example, if you child's name is Stephanie you could use the password "St3ph4n13" instead. If it cannot be read as a word it is much harder to crack.
  2. If your website is using content management software such as Joomla, WordPress, or Drupal (such as Anttix websites) have your web developer or IT specialist update your software. This should be done as often as once a month and no less than every 3 months. Also, if a security threat is announced you should update immediately regardless of an update schedule. If you are an Anttix client don't worry, we update all sites if any serious security threats arise on our client's behalf. If your site software has no available security update when it is needed then it may be time to upgrade your site to another software package and service.
  3. When it comes to email our spam detection can do a pretty good job of catching fraudulent or malicious emails. However, sometimes a few clever ones can slip past this security. Be sure to never open attachments from sources you do not trust and avoid any emails that ask you to offer passwords or sensitive information. Be sure when you are providing sensitive information it is through a trusted source with acceptable security.
  4. Backup your local files often, especially when working on large pieces of data such as spreadsheets and multi-page documents or presentations. You never know when a crash or attack may happen, and it is certainly best to play it safe when you don't want to lose your work. We recommend external drives and flash drives for external storage to make sure it is safe.
  5. Be careful who you friend and connect with on social media networks. Many false account are created with malicious intention of connecting with users and gain access to your personal information. The best case scenario is they use your information to spam advertising your way, but the worst case is when they use this information to steal your identity.
  6. Even when you are not online there is some risk of attack. Be wary of suspicious phone calls from "support centers' claiming to be from sources such as Microsoft. They attempt to get you log into your computer and grant them access so they can "fix" a problem your computer reported to them. Companies such as Microsoft will never call you in such a manner, and these calls are only meant to cheat you out of data and force you pay for your files. If you receive such calls, or a pop-up on your computer telling you to contact a service center, ignore them. You may report the malicious call to the authorities and be sure to keep your legitimate anti-virus software up to date to avoid these malicious attempts.

Most of all, always keep in touch with IT professionals and your web developers to stay informed and safe. Call Anttix today at 877-426-8849 or click here to contact us if you would like to know more.

Category:
 
Tags:
 

Poodlebleed SSL Vulnerability Announcement

Security Alert

Many website owners and technology enthusiasts already know about the recent Heartbleed vulnerability with the security of a website, also known as SSL. This vulnerability has since been corrected but now we are facing a new emerging threat called Poodlebleed. Poodle stands for Padding Oracle On Downgraded Legacy Encryption but what it basically means is the secure data passed between a secure server and a web browser can be compromised and changed into plain text. That means passwords, credit card numbers, and other sensitive data can be read and taken while in transit. This is very serious and should be addressed immediately by your hosting provider.

If you are an Anttix client you should not worry. We have already taken the necessary steps to correct it. The issue lies with version 3 of cryptographic protocol known as SSL (Secure Socket Layers). The vulnerability only occurs when the end-user is browsing a secure page through an out-dated browser. So in order to be vulnerable to Poodlebleed not only must the server contain SSL version 3, but the user must be using an out-dated browser. By removing SSL version 3 users with out-dated browsers will no longer be able to use the encrypted portions of your site. This, however, is not a bad thing. It is better to have a secure site with no vulnerability than a site that services old browsers, while leaving your users vulnerable to identity theft. Encourage your users to update their browsers, especially for their own sakes. Outdated browsers can have a multitude of other vulnerability issues, leaving the user subject to multiple forms of attacks.

As a security reminder we encourage all of our readers to update your important passwords on a regular basis, and keep all of your internet and virus protection software up to date. Security is very important to us and we will do everything we can to stay secure on our end. We hope none of you are affected by Poodlebleed, and if you an Anttix hosting client rest assured that you are protected. If your website is not hosted with Anttix, please contact your provider right away and make sure the proper steps have been taken to secure your site.

If you would like information on how Anttix can make your website more secure, contact an Anttix representative today at (877) 426-8849 or click here to email us.

Category:
 

A Step Ahead of Malware

custom website design

One of the functions of the Anttix Antics newsletter is to inform clients of potential internet and web-related dangers. As such, we have always highly encouraged the use of quality antivirus software to protect your computer from spyware and malware. This year, however, mobile device users need to take that priority one step further.

With the number of applications and users growing by leaps and bounds, it is only (unfortunately) natural that mobile devices are quickly becoming the target of malware developers. In fact, in Larry Barrett's article "Hackers Set Sights on Android Mobile Devices", he reports that attacks on mobile devices rose 33% in 2010 (enterprisemobiletoday.com). One can only expect this number to increase in 2011.

To review, malware is any software that is designed to do harm to your system or your privacy by gathering personal information and/or infecting various applications. While in the early days of mobile device use the threat mainly relied on installation by unsuspecting users, today more sophisticated connectivity has opened new avenues for problems.

Now for the good news. Protecting your mobile device is as easy as protecting your computer. In most cases, you can find a comparable product from your current security provider. Installation generally involves a simple download process. Just remember to look for protection that:

defeats viruses, malware, spyware, and text spam.
guards against user generated and non-user generated malware.
provides constant security updates.
endorses secure content. (This also works in your favor as a confidence builder for your customers. They will appreciate seeing that your website is securely endorsed on mobile devices as well as on traditional computers.)
allows your device to continue running at peak performance.

Whatever malware protection product you choose, install it as soon as possible. Start the new year with security in your pocket.

Category:
 

Scam Savvy Teens

custom website design

You told them what?!
A teenager I know recently approached me excitedly. He told me all about the online contest he had won. Among hundreds of thousands of others, he was selected to receive $1,000, and various perks, including free dvd rentals. Naturally suspicious, I asked him when and how he entered this contest. "That was the best part-- I didn't even have to enter!" he boasted.

Oh boy. Major red flag. I quickly told him not to supply any personal information, particularly social security or credit card numbers. "If you truly won something, it will be sent to you with no strings attached. Remember, if it sounds too good to be true, it probably is."

The next day the boy regretfully admitted that he had been scammed. In fact, to my amazement, he had even given out a credit card number, reasoning that dvd accounts often ask to have one on file. Fortunately, he was able to cancel the card and prevent real trouble. What baffled me most was that this particular teen is very intelligent and analytical. How could he fall for such obvious fraud?

SuperTeen!
Teens naturally have a few strikes against them, making them perfect cyberscam victims. First and foremost, they have not lived long enough or made enough mistakes to be cautious or suspicious. Add to that the biological fact that their brains are not yet fully developed [no jokes, please!]. Inconveniently, they are lacking the means to fully comprehend the decision/consequence connection. This accounts for a false sense of invincibility, especially in familiar settings like the online community. Teens also wage a daily battle to be accepted and to feel special. What makes a person feel more important that being singled out as a winner?

Becoming Scam Savvy
So what are parents, teachers, and bosses of teens to do? As with other teen issues, the foundation is communication. Take time to discuss how prevalent scams are. Show them statistics if necessary. Teens can even be scammed, in some cases, by other teenagers. Decide as a team what constitutes off-limits information. Addresses, birthdays, and phone numbers should be guarded like social security numbers and credit card information. As always, keep the computer's security software updated, and take advantage of email filters.

Too Late?
If your teen or tween does fall for a scam, above all, do not overreact. Doing so may limit the amount of information he/she is willing to tell you. You will need to know every detail about where, when, and how the fraud took place in order to properly handle the situation. Determine the necessary steps, and involve the teen in the process of reporting and correcting the problem. As was the case with the boy I talked to, no major damage was done, but he was significantly scared into a valuable life lesson. I guarantee that he will not fall for an internet scam or casually give out personal information anytime soon!

Category:
 
Tags:
 

Safe, Secure, and Secret

custom website design

When I was growing up, I remember adults quipping that, "Only two things in life are certain-- death and taxes." Perhaps these days that adage should be changed to read "death, taxes, and computer viruses". Either you have already experienced the frustration of dealing with a computer virus, or you will, at some point, be the target of an attack. This should not be cause for alarm, provided you are armed with the best defense.

Choosing Antivirus Software
Begin by installing a good antivirus package. Consider the 'two Ps'-- protection and performance. Good software will protect against spyware (software that gathers a user's information without his/her consent, like a private investigator), and malware (software designed for the malicious purpose of disrupting, damaging, or destroying a user's system).

It will also perform well, meaning that it will run smoothly on a computer without sucking up too many resources, slowing your computer down. For the average small business, most extra programs that come with an antivirus package are unnecessary. Anttix has found that Trend Micro Antivirus plus Antispyware meets both of these qualifications. Remember though, any antivirus software is an ongoing process. Use the scheduling feature to set up daily automatic updates for a time when you are not generally using the computer.

Choosing Better Passwords
In addition to good antivirus software, step up your password selection. Instead of using your favorite 'abcd' for everything from entertainment blog websites to your personal financial records, experts agree that you should:

Change passwords from time to time.
Use different passwords for different websites.
Use at least 6 characters.
Mix letters, numbers, and special characters.
Avoid single words.
Avoid obvious personal connections. Instead of using your own birthday, use someone else's birthday that you will remember.

Finally, if you hesitate at the prospect of memorizing so many complicated passwords, visit www.lastpass.com. LastPass is an online encrypted database that stores all of your passwords. As "the last password you'll have to remember", your LastPass account will automatically fill your other passwords in on the appropriate website logins when you need them. LastPass is gaining media recognition, and Anttix has recently used the site with positive results. So get creative and get safer!

Category:
 
Tags:
 

Hosting Evaluated

custom website design

It is no secret that the United States has had financial difficulties during what is now being termed The Great Recession. As small business is the economic backbone of the country, many privately owned enterprises have been hit particularly hard as customers tighten their purse strings. Such circumstances cause us to closely evaluate the many costs of operating a business. Somewhere along that checklist lies hosting.

The obvious question is whether or not higher-end hosting is worth the price. After all, what about companies who claim to charge only $5 per month... or nothing at all? In truth, these providers are probably fine if all you require is the internet presentation of a few static pages. For the average business owner, however, quality hosting is necessary to deliver the quality website he/she depends on for increased sales.

The main problem with cheap hosting is that there can be frequent downtime. This happens for a number of reasons, including having pages that exceed the bandwidth, or hosting too many websites from the same server. Whatever the reason, when a website is inoperable a little too often, search engines make a note of it. Consequently, your site may be ignored.

You also have to consider the possibility of a hosting scam. Think about it-- the bogus companies are going to advertise cheap rates because it is easy bait. They would not be able to lure people in with monthly rates of $20-$30. Be cautious. No amount of savings would make up for becoming the victim of a con artist.

Hate red tape? Low-quality hosting is a headache waiting to happen if you ever have to change hosting companies. In addition to the tedious process of switching your entire website over, you risk losing important data. Again, your professional image is at stake. Whether due to dissatisfaction with your provider, or the blessing of increased web traffic, you may want to upgrade at some point. Why not do it right from the start?

Finally, your hosting provider should offer excellent customer service. The people behind the company are a reflection of the support behind your website. If you have a question or concern, they should be ready and willing to address it effectively.

As always, it is wise to assess your needs for the present, while keeping in mind future growth. For more information on Anttix hosting features and rates, visit our website.

Ask about special discounts for Plainfield website hosting, Shorewood website hosting, Naperville website hosting, and Chicago website hosting.

Category:
 
Tags:
 

Credibility Through SSL Certificates

custom website design

By now most internet savvy people understand the dangers of identity theft. Many website owners, however, do not fully grasp the necessity of protecting their site users with SSL certificates.

'SSL' stands for secure socket layer. Simply stated, when a website has an SSL certificate, it guarantees secure transactions between web servers and browsers. A cryptographic system is used to encrypt data, requiring two keys to unlock it. One is public, known to everyone. The other is private, known only to the recipient.

An SSL certificate is imperative if you deal in any type of eCommerce, to protect credit card numbers, addresses, and other information. Even if your website does not sell products or services, you should be using an SSL certificate if you process any personal information such as passwords or social security numbers. Some site owners also use them simply to keep compliant with confidentiality laws and policies.

So what's in it for you? The answer is simple: if you establish credibility with your website visitors, they are far more likely to return and/or make purchases from you. There are too many risks on the internet for potential customers or clients to take a chance on a site without an SSL certificate. To someone who is not personally familiar with your business or organization, SSL can stand for safety, security, and legitimacy.

Talk to an Anttix representative to learn more about the details of an SSL certificate and how it can benefit your website.

Category:
 
Tags:
 

Anttix Goes Green

custom website design

It might seem like a website development company would automatically be green. After all, there are no smoke stacks belching soot, and we are not dumping toxic sludge into the rivers of Illinois. Often though, it is the little things we overlook that can impact our environment. To combat some of the problems that affect the atmosphere of our globe, Anttix has taken the following steps:

  • Reducing Waste- Whenever technology allows, we avoid paper waste. All correspondence and note-taking are done digitally.
  • Recycling- From using recycled paper for any print material we provide, to recycling water bottles we drink in the office, we are committed to this simple and effective act.
  • Using Green Supplies- All around our office you will find earth-friendly products, including cleaning products.
  • Reducing Vehicle Emissions- To minimalize the Anttix carbon footprint, we provide training over the phone, digital instruction documents via email, and online seminars as needed.
  • Keeping the Atmosphere Green- Our office incorporates efficient lighting, heating, and cooling systems. We use laptops exclusively, which use only 1/4 of the power of desktop computers. On weekends unneeded equipment is shut off, and we even keep a few VOC-eating plants around as mascots.

If you are considering adopting some greener practices for your business or organization, remember that it benefits you, too. In addition to saving money on supplies, utilities, and possibly even fuel, you may gain tax breaks. Customers and clients will respect you for your decision to be environmentally conscious, and you will open yourself to an entire market of individuals who seek out such companies. Going green is a truly win-win situation. Contact Anttix for more strategies to verditize your business.

Category:
 
Tags: