How does protection against viruses and harmful files work on hosting?

The only way a virus, malware, or harmful script can infiltrate a website is through a security vulnerability within the website itself. These vulnerabilities allow the exploitation of regular website functions, making them difficult to automatically detect and block.

The hosting platform consists of several layers of security that prevent a website from being compromised or misused as a result of a server-side breach.

These security measures are so robust that any tightening could interfere with regular site traffic.

To ensure that your site is fully protected and in line with the server-side protection, it is necessary to:

  • Regularly update your site, themes, and plugins (once a week or whenever an update is offered)
  • Regularly review your site, users, and check if there is anything that shouldn't be there
  • Regularly check files on your hosting and see if there are any files that shouldn't be there
  • Educate yourself on website monitoring and maintenance, or hire someone to assist with these tasks

There are tools on the hosting platform that can help you detect and clean your site:

  • ImunifyAV is available on all plans
  • Imunify360 is available on Business, Business Plus, and Business Premium plans

For more information, read here: Imunify.

Monitoring and Responding to Security Issues

Our technical support team monitors the server's operation and security status, notifying users when an issue is detected.

Users can also monitor the status of their site in their cPanel through the ImunifyAV or Imunify360 application, where they can view scan results for files.

If the issue persists or recurs, or after receiving an official complaint about misuse or abuse, the service may be temporarily suspended while the user resolves the security problem on their website.

Responsibility for Security Vulnerabilities on the Website

Users are responsible for selecting, installing, and maintaining scripts, websites, themes, and plugins on their site. The responsibility for maintaining such content lies with the user.

Our technical support team is happy to assist with the tools that are available. Restoring a site from a backup can be a temporary solution in these cases, but it is not a permanent fix. The permanent solution involves cleaning the site, replacing all files with clean ones, and addressing any security vulnerabilities in the scripts.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

CPU Usage

Shared ServersAdriaHost allows a maximum of 25% CPU usage limit. You may exceed this limit for no...

How can I make a stronger password?

How can I make a stronger password?Password SelectionA good password is easy to remember, but...

How Can I Prevent Hacking?

The most important thing to do is keep your passwords a secret. If you must give a password to...

SQL injection, insertion

SQL injection is an attack where malicious code is passed to an SQL Server for execution. The...

How to Handle the Google Attack Page

When you see the dreaded Google Attack Site warning, you should immediately submit a ticket to...