Jump to main contentmickwood.com - Website Hosting & Design for Christian Organisations
Isaiah 53:6 - We all, like sheep, have gone astray, each of us has turned to his own way; and the LORD has laid on him the iniquity of us all.

Network Security

We do run everything we can to keep the servers as secure as possible. We implement a number of security features to protect your Web site and data including:-


All our servers are CloudLinux OS which are specifically designed for shared hosting providers.


A Firewall is a security system that acts as a protective boundary between a network and the outside world by filtering information coming from the Internet into our computer systems. If an incoming packet of information is flagged by the filters it is not allowed through. For example, we could instruct the firewall to block any packet with the word "X-rated" in it. A firewall can also implement security rules.

Without a firewall in place all of our computers would be directly accessible to anyone on the Internet. A person who knows what he or she is doing could probe and access our computers. Therefore we use CSF Firewall which is a Stateful Packet Inspection (SPI) firewall, a Login/Intrusion Detection and Security application for Linux servers. It is a security tool that can protect our servers against attacks, such as brute force, and improves server security.

Virus Protection

Probably the most well-known threat is the computer virus. A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing all of your data.

ConfigServer eXploit Scanner (CXS) has been installed on each of our servers. CXS is a tool that performs active scanning of files as they are uploaded to the server. In particular CXS will scan all incoming and outgoing email and will inform the recipient and sender of an infected message.

Intrusion Detection

We use ModSecurity for Intrusion Detection (ID). ID is the art of detecting inappropriate, incorrect, or malicious activity by individuals attempting to access and manipulate information and cause computer systems to be unreliable or unusable.

Sometimes, a distinction is made between misuse and intrusion detection. The term intrusion is used to describe attacks from the outside. Misuse is used to describe an internal attack.

Port Scanner Blockers

Hackers may try to identify possible security problems in our operating systems, and the applications running on them, using Port Scanners. Port Scanner Blockers prevent hackers from identifying and exploiting such weaknesses. We use CXF Firewall to do our port scanning.

RAID10 (Raid 1+0)

RAID 10, also called Disk Mirroring, is installed on our servers in case there is a disk crash. Basically we write all of your data to two separate hard disks installed on the server. One is a mirror of the other. Should the primary disk experience a hardware failure, the mirror disk will continue operations as if nothing had happened. All of your data is protected. We also have backups that can be restored if the RAID10 fails.

welcome | name | hosting | design | content | promote | update | showcase | support | general information

Welcome Showcase Support Update Promote Content Design Hosting Name