myRepono - Website & mySQL Database Backup Service
WordPress FAQ Blog Affiliates Contact Log-In


2nd November 2010

Blog >> 10 Steps to Secure Your Web Hosting Account

It's a common assumption to think that your host is taking care of your website's security, the truth is they are, but that doesn't mean there aren't plenty of steps you can take to enhance and improve the security of your web hosting account.

Step 1. Your Username and Password


Password Statistics

  • The most commonly used password is password1.
  • 52% of people never change their passwords unless required to do so.
  • 66% of US consumers use only 1-2 different passwords.
  • 42% of Hotmail users use passwords containing only lowercase letters.
  • 19% of Hotmail users use passwords containing only numbers.
  • Nearly 1% of Hotmail users use the password 123456.


It may seem obvious that the security of your login credentials for FTP, your control panel and so fourth is important, but approximately 42% of users use simple text passwords without numbers or symbols.

It's also frighteningly common that users use their username as their password. When you consider the username usually forms part of the server directory path and the fact that this is disclosed in environmental variables, then you realise they may as well not use login details.

For a basic level of security your username and password should always meet the following criteria:

  • Minimum 8 characters in length, preferably 10 or more.
  • Contains both capital and lowercase characters.
  • Contains at least 1 numeric character.
  • Does not contain any dictionary words.
  • Is not used for any accounts with third-party websites/services.

For increased security your username and password should meet the following criteria:

  • Contains at least 3 numbers which are not grouped.
  • Contains at least 2 non-alphanumeric characters/symbols which are not grouped.
  • Does not contain more than 3 characters which may form part of a word.

You should endeavour to change your passwords regularly to ensure their security is maintained.

For assistance generating a secure random password we have provided a convenient random password generator:

Step 2. Lock Your FTP Account

Many hosting companies now enable you to secure your FTP account, either enabling access for short periods of time via a control panel or restricting access by IP address. If possible, you should always disable FTP access when you're not using it to ensure it can not be attacked.

Step 3. Use Secure FTP

Rather than using standard FTP you should use SFTP to ensure all data transfer is secure. Most hosting companies support secure FTP usually via port 22 - simply update your FTP software settings to use SFTP and the appropriate port and all your data transfer will be secured.

If your FTP software does not support SFTP, try Filezilla or WinSCP:

Step 4. Lock Down Your File Permissions

Filezilla FTP File Permissions

If you use a Linux/Unix web server then you can set permissions on each file and directory which control which users and groups within the system can access the files. You should familiarise yourself with your file permissions to ensure your file structure is secure, for example setting the permissions to 777 will allow access for any user on the system, unless another permissions system is limiting access.

You should avoid settings open permissions such as 777, 775, 755, 666, 664 or 644. It's good practice to set your directories to 555 (all read and execute) and files to 444 (all read) unless you need to open access to a specific user/program. Depending on your server configuration this may not be a possible so please check with your system administrator for advice specific to your hosting environment.

Step 5. Clean Your Files

You should check your files and directory structure regularly to ensure they are not disrupted. Always check any unusual files which you do not recognise as it is possible these have been created by a malicious user, you may also like to consider restoring your PHP files on a routine basis incase any malicious code has been added.

You can use a file integrity checker such as AIDE (Advanced Intrusion Detection Environment) to scan and audit your file structure, and notify you to any changes or anomalies:

Step 6. Check Your Logs

You should check your system logs for suspicious activity on a regularly basis, including your error logs and visitor access logs. Various tools exist to help you audit your logs, but a basic check using your web site statistics software (e.g. Webalizer or AWStats) will often highlight key issues such as hot linking:

Step 7. Keep Software Up-To-Date & Install Server Updates


Website Vulnerability Statistics

  • 70% of websites are open to cross-site scripting attacks.
  • 50% of all websites are subject to information leakage attacks.
  • 25% of websites are subject to phishing and content spoofing attacks.
  • 20% of websites are unprotected against SQL injection.


If you're using third-party software such as WordPress or Joomla then you must ensure you keep up-to-date with the latest releases. Software updates usually include security fixes which are documented in the release notes, this means a malicious user can simply use the release notes as instructions for hacking your website! Keeping your software up-to-date is critical for ensuring you don't leave security holes open.

If you are responsible for your server configuration and management then you must ensure you install the latest operating system and software updates. As with software, any operating system security fixes are usually well documented and therefore extremely easy to exploit.

If you are not responsibly for your server configuration and management then you should build a strong relationship with your hosting provider and ensure they are regularly updating your server's operating system and software.

Step 8. Use a Reputable Hosting Service

Many web hosting companies are simply interested in the quantity of customers they can get, and not in the quality of service and support that they offer. It's worth paying a little extra and using a reputable web hosting service which provides comprehensive service and support, and which you can build a strong working relationship with.

For those of you who require dedicated servers or VPS hosting solutions, we highly recommend ServINT whom we have used for many years. We also recommend Bluehost and Heart Internet:

Step 9. Use a Server Auditing Service

If you are concerned about the security of your website/server then you should consider using a server auditing service. There are numerous online services and software applications which fully automate the process of auditing your server, scanning for everything from XSS attacks to session hi-jacking.

Step 10. Learn More About Website Security

If you want to run a website then it's a good idea to invest some time in learning about website security. We recommend the following online resources and books:

Step 11. Backup Your Website

If you're not already using myRepono to backup your website please sign-up now to ensure your website is regularly backed up. Having a good backup is the ultimate protection against any attack - with myRepono you can restore a damaged website in seconds!

Article Statistics Sources:

Share |


On 18th September 2011, myRepono Team posted:

"Thanks for the great suggestion Matt! Two-factor authentication is an excellent method for enhancing security and is implemented on many major sites including PayPal. There are many providers of two-factor authentications systems (and associated keys) which can be integrated with your own site including VeriSign, Signify and Mi-Token."

On 18th September 2011, Matt posted:

"You could also add to the list, "use second factor authentication" instead of standard passwords. There is a new website authentication method [shieldpass] where you buy cheap access cards and then add the widget to your login page. You then place your card onto the screen to see the dynamic login numbers instead of a static password. It is unique in also being able to encode transaction digits for mutual authentication which stops attackers man in the middle tactics, even one with access into your laptop or mobile."

Post Comment


(Not required)

Email Address:

(Not published)











Twitter Follow myRepono on Twitter
RSS Feed Subscribe to myRepono RSS Feed

Tell us your backup stories!

Have you experienced a backup disaster? Please tell us about all your computing mis-haps and we'll include the best stories in our blog!