Instructions for new users can be downloaded at the bottom of this article.
Background Context
The reliability of a website is the most importing aspect of ownership. When the website is down for whatever reason, there is nothing for your marketing team to promote.
One of the biggest influences on reliability is security. Security is a combination of onsite software and offsite hardware and networking. However, one of the most overlooked areas of security is enforcement of protocols and procedures.
Website are broadcast to the public and therefore they are available to vandals. All the websites we host experience attempted hacking and brute force attack every day. Vandals write software that exploits weaknesses in the software and password are simply not enough protection.
Second factor authentication (2FA) is the process of sending a one-off code to a verified personal device (mobile phone). The code is used to verify your identity with your password. 2FA is now common in many financial, government and health institution websites.
We install Rublon 2FA into all website we host. It is mandatory that clients ensure all users, staff, third-parties, consultants and customers register and use the security measure. Clients with super-admin access must never disable or remove the 2FA software.
Our Acceptable Use Policy (AUP) and Website Hosting Terms & Conditions stipulate how our services are to be used. By using our services you have agreed to operate according to our Acceptable Use Policy and Website Hosting Terms & Conditions.
Link to terns and policies: https://knowledge.websetgo.com.au/kb/terms-conditions/
Related AUP Policies
All the following activity is prohibited:
Decompiling, disassembling, reverse engineering, or otherwise attempting to discover source code of any programs, software, or data on the services.
Use of any technique that attempts to deceive, bypass, or manipulate the proper function of online search facilities, also known as “black hat”, conduct or activity.
Sharing usernames or allowing multiple users to access a restricted services using the same username. Auditing requires that individual users need individual usernames.
Installing or using prohibited or disallowed software, systems, networks, plugins, or modules.