{"id":2388,"date":"2020-08-26T06:33:32","date_gmt":"2020-08-26T12:33:32","guid":{"rendered":"https:\/\/www.scalahosting.com\/blog\/?p=2388"},"modified":"2025-11-24T02:53:40","modified_gmt":"2025-11-24T08:53:40","slug":"data-protection-in-scala-hosting-shared-web-hosting-plans","status":"publish","type":"post","link":"https:\/\/www.scalahosting.com\/blog\/data-protection-in-scala-hosting-shared-web-hosting-plans\/","title":{"rendered":"ScalaHosting Shared Hosting Data Protection"},"content":{"rendered":"\n<p><strong>Every person using <\/strong><a href=\"https:\/\/www.scalahosting.com\/web-hosting-for-small-business.html\"><strong>shared web hosting services<\/strong><\/a> is more or less concerned about the protection of their data. It&#8217;s absolutely natural \u2014\u00a0 there are other users on the same server, which opens the doors<strong> for all kinds of breaches and web attacks.<\/strong><\/p>\n\n\n\n<p>ScalaHosting works on improving the security of shared hosting servers, and there is always a lot to do in that regard. Today, we will share some of the things we do to <strong>ensure every client project is safe from cyber attacks.&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ScalaHosting has developed a custom security software that scans all files within the public_html directories<\/strong><\/h2>\n\n\n\n<p>It looks for configuration and system files, which contain sensitive information such as <strong>MySQL login details<\/strong> and access authorization. Should any of your preset permissions are wrong \u2014 our solution will fix them.&nbsp;<\/p>\n\n\n\n<p>Whenever a website is compromised, the attacker often looks to get access to password data to steal your login details and gain full control over your account. That\u2019s why it is important to keep file permissions set to <strong>600<\/strong> or even <strong>400<\/strong>.&nbsp;<\/p>\n\n\n\n<p>The three numbers relate to the binary value of <strong>reading<\/strong>, <strong>writing<\/strong>, and <strong>execution<\/strong> rights, where<strong> 0 gives no access, and 1 allows the user to perform a certain action<\/strong>. This way, a value of 400 means no one else can read the protected files except you.<\/p>\n\n\n\n<p>Another exciting feature of our security system is the <strong>traffic monitoring tool<\/strong> that regularly scans your online activity to look for malware. If it detects malicious activity, the system <strong>notifies the client<\/strong> and helps them take the necessary actions.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 20px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ScalaHosting&#8217;s mod_security rules are being updated on a weekly basis so we can block most of the attacks that come to the server and customer websites.&nbsp;<\/strong><\/h2>\n\n\n\n<p>We have also installed <strong>ClamAV<\/strong> on all servers to <strong>scan for viruses<\/strong> and <strong>stop malicious files<\/strong> from being uploaded to the server via FTP. But that&#8217;s not even half of it.<\/p>\n\n\n\n<p>Our security system <strong>tracks the running processes<\/strong> on all servers 24\/7 for suspicious activity. This goes for any of our packages, even the most <strong>affordable web hosting<\/strong> and <a href=\"https:\/\/www.scalahosting.com\/reseller-hosting.html\"><strong>reseller plans<\/strong><\/a>.&nbsp;<\/p>\n\n\n\n<p>Of course, even with Scala&#8217;s enterprise-grade security solutions, the customer has an important role in maintaining their online safety. <strong>Keeping all scripts, plugins, and themes up to date<\/strong>, using hard-to-guess passwords, setting proper permissions, <strong>disabling public access to your admin area<\/strong> \u2014 those are all a must if you don\u2019t want to have issues with hackers.<\/p>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 20px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Even if you manage to handle all of the above, there is still one other thing to consider<\/strong><\/h2>\n\n\n\n<p><strong>Data backups<\/strong> are your Plan B in case things go sideways. You have to ensure to not only back up your data every day, but to <strong>keep it in a secure offsite location<\/strong> as well. This way, even if someone gains control over the server and your website files, you will still have a <strong>working copy saved elsewhere<\/strong>.&nbsp;<\/p>\n\n\n\n<p>ScalaHosting allows all web hosting and reseller clients to <strong>restore data from seven recovery points<\/strong>. The backups are safely stored on a remote server, but we still highly recommend keeping your own copies as well.&nbsp;<\/p>\n\n\n\n<p>You can always hope for the best, but that doesn&#8217;t mean you shouldn&#8217;t prepare for the worst.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every person using shared web hosting services is more or less concerned about the protection of their data. It&#8217;s absolutely &#8230;<\/p>\n","protected":false},"author":107,"featured_media":2514,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"ScalaHosting Shared Hosting Data Protection | ScalaHosting Blog","_seopress_titles_desc":"Time to talk about cyber security. Here is what ScalaHosting can offer in terms of website security, data protection, malware prevention, and more...","_seopress_robots_index":"","_seopress_analysis_target_kw":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-2388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/2388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/comments?post=2388"}],"version-history":[{"count":8,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/2388\/revisions"}],"predecessor-version":[{"id":73308,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/2388\/revisions\/73308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/media\/2514"}],"wp:attachment":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/media?parent=2388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/categories?post=2388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/tags?post=2388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}