{"id":11250,"date":"2023-01-24T19:35:00","date_gmt":"2023-01-24T18:35:00","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=11250"},"modified":"2023-07-17T12:52:02","modified_gmt":"2023-07-17T10:52:02","slug":"choice-hostingcompany-impact-cyber-security","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/choice-hostingcompany-impact-cyber-security\/","title":{"rendered":"How right choice of hosting company has big impact on your cybersecurity"},"content":{"rendered":"<p>More and more companies are understanding the usefulness and the need to invest in cybersecurity. But did you know that your hosting provider also has an important role and a great responsibility in this respect? Of course, Combell takes this responsibility and is committed to protecting your website via multiple IT services. <a href=\"https:\/\/www.combell.com\/nl\/blog\/files\/TechPulse_Interview_Combell.pdf\">Therefore, Techpulse asked us to speak as a hosting expert in the 2022-2023 ICT yearbook (published in Dutch)<\/a>. You can read what you absolutely must keep in mind in this blog post.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Solve problems only when they arise? Cybersecurity is better tackled in a different way. \ud83d\ude00 Because Internet fraud such as <strong>phishing, spoofing, ransomware<\/strong> ... are unfortunately popping up everywhere. So it is very smart for a company to free up its budget and optimally secure its IT infrastructure.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-631036fe uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is phishing and how do I recognize it?<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image alignwide size-full is-style-devplus-image-rounded-shadow\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/What-is-spoofing.jpg\" alt=\"Wat is spoofing\" class=\"wp-image-24642\"\/><\/figure>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Whatever you put on the internet needs to be properly protected<\/h2>\n<p>Did you know that investing in the right hosting company has a big impact on your company's cybersecurity? Thanks to hosting, you place your website, webshop or other application on the internet. And everything you put online needs to be very well protected.<\/p>\n<p>Not every hosting company provides optimal protection. Combell does. In order to optimally protect your data, we try <strong>to block as many attacks as possible beforehand<\/strong>. This way, your application remains completely unaffected.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Combell cybersecurity = service, support and worry-free<\/h3>\n<p>Have you little understanding of cybersecurity and how to set up a protected IT environment? As a Combell customer, there is no need to do all this. We take away all your concerns about cybersecurity. Whether you have a standard hosting package with Combell or opt for a higher hosting level, many <strong>services that provide cyber protection are included by default<\/strong>. Which is not the case with every hosting company. \ud83d\ude42 So, as our customer, you are protected on several levels.<\/p>\n<p>What are you going to notice about that standard security? Well, hopefully nothing. Because we are doing everything to protect your websites from attacks.<\/p>\n<p>Our <a href=\"https:\/\/www.combell.com\/en\/blog\/how-combell-shield-protects-webhosting-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Combell Shield<\/a> <strong>protects everyone who has a web hosting package hosted by Combell<\/strong>. We are incredibly proud of this - and this is also shown by the interview that one of our chief technology officers, Wesley Hof, gave to <a href=\"https:\/\/itdaily.be\/blogs\/security\/een-schild-voor-je-website-hoe-hostingprovider-combell-zijn-klanten-van-malware-beschermt\/\" target=\"_blank\" rel=\"noreferrer noopener\">ITDaily<\/a>. Wesley is very clear about it: \"Combell Shield includes a multitude of security solutions with which we block attacks and malware, before they hit our customer.\"<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/webshop-combell-shield-protection-1.jpg\" alt=\"webshop-combell-shield-protection\" class=\"wp-image-24640\" width=\"600\"\/><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-515848b6 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Tip<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/combell-shield-upgrade\/\" target=\"_blank\" rel=\"noreferrer noopener\">Combell Shield 2.0. makes your web hosting even more secure<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Protection against DDoS attacks.<\/h2>\n<p>With our remote scrubbing services, we reroute malicious traffic while keeping the \"clean\" traffic of genuine visitors continuing to flow. This is quite <strong>unique<\/strong>. Because many of our competitors take customers offline at that point to protect them, while our strategy is to keep you, our customer, <strong>always online<\/strong>. On the other hand, we make sure that we always have enough capacity to mitigate risks of DDOS attacks.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Our strategy is to keep our customer always online even during a DDoS attack. That's pretty unique.<\/p>\n<p><cite>Wesley Hof, CTO at Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-cc615a7a uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/how-does-combell-protect-you-against-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">How does Combell protect you against DDoS attacks?<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Firewalls at Combell<\/h2>\n<p><strong><a href=\"https:\/\/www.combell.com\/en\/technology\/firewall\" target=\"_blank\" rel=\"noreferrer noopener\">Of course, Combell also offers the best firewalls<\/a><\/strong>, including the next generation firewall. This allows us to analyze data traffic even more precisely and to detect and block suspicious requests. In addition, we also provide web application firewalls. These ensure that the usual web attacks are detected and then proactively blocked.<\/p>\n<p>The difference with an ordinary firewall that filters connections is that the web application firewall sees into the connection and sees in detail which http traffic is flowing specifically to the application. So that allows us to look one layer deeper into your data flow. If a leak is detected in a particular e-commerce software, it is often quickly exploited by rogue organizations, even before the software vendor is able to release security updates.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Backups in case of hacking<\/h2>\n<p>In case you do get hacked, it is very important that your hoster can provide a consistent backup. Check that! Combell always places the backup on another physical location in another data center. This way, we make sure that there is no physical connection between what is live and the backup site.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Ongoing security updates from Combell<\/h2>\n<p>Furthermore, in the world of security, you must perform updates as soon as possible. At Combell, we are very strict about this. We constantly perform security updates, monitor them and make sure that your servers are at the latest patch level in time. In fact, we have our own patch first strategy.<\/p>\n<p>That patch first strategy means: patch first - meaning protecting you - and only then we start communication and explain the steps we have taken. That way, we don't lose valuable time.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/website-server-updates.png\" alt=\"website-server-updates\" class=\"wp-image-24568\" width=\"600\"\/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Customized security<\/h2>\n<p>We work day and night to create the most secure environment behind the scenes where attacks are dealt with immediately. Those who want even more security or extra protection for their hosting can choose a number of additional services.<\/p>\n<p>These extras, customized to your needs, are called custom security. This is the ultimate cybersecurity for your company. We have an appropriate solution for every security risk. Your applications remain online and your data absolutely secure. Peace of mind guaranteed!<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Count on Combell for:<\/h2>\n<ul>\n<li>Guarantees that you <strong>always remain online<\/strong>, whatever happens<\/li>\n<li><strong>24\/7 support <\/strong>by experienced experts who know your environment<\/li>\n<li>Security that <strong>scales with your needs<\/strong><\/li>\n<li>Solutions that are <a href=\"https:\/\/www.combell.com\/en\/about-combell\/iso-certificate-hosting\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 9001 and ISO 27001 certified<\/a><\/li>\n<\/ul>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-yellow-background-color has-text-color has-background\" href=\"https:\/\/www.combell.com\/en\/tailored-security\">Discover the possibilities of security tailored to your needs with Combell<\/a><\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Do you already see the usefulness and necessity of investing in cyber security? And did you know that your hosting provider has an important role to play in this?<\/p>\n","protected":false},"author":33,"featured_media":11260,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62],"tags":[1242],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/Cyberveiligheid-interview-Wesley-1-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Amber","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/amber\/"},"uagb_comment_info":0,"uagb_excerpt":"Do you already see the usefulness and necessity of investing in cyber security? And did you know that your hosting provider has an important role to play in this?","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11250"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11250"}],"version-history":[{"count":10,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11250\/revisions"}],"predecessor-version":[{"id":11308,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11250\/revisions\/11308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/11260"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}