Business & Enterprise Web Hosting
Downtime? Never heard of it.
Your Website Matters
Everyone is susceptible to website hacking, but not everyone has the protection in place to prevent the potential damage. Working with discount hosting companies offers up a whole new level of risk. Large hosting companies may:
- Be targets for attacks on a bigger scale
- Withhold information about attacks to protect their image
- Provide hackers access to several different websites, making mitigation difficult
- Offer a massive treasure trove of information from thousands of clients
Plan Left can provide high security, better service, and—in the unlikely event that malicious activities occur—faster recovery.
Our Security Is Second to None
One Site Per VPS
We restrict each server to only one site, using Virtual Private Server (VPS) machines, which can scale down or up to an appropriate size for each website. Other website hosting services only use access control to keep accounts separate. If any single site or server we host is ever compromised, there are no neighbors to break into.
Proactive Server Security Updates
Every server is on the same security update schedule, which helps us keep them in sync and secure. These updates look for recommended releases every night and deploy these environmental updates automatically.
Proactive Website Security Updates
Website platforms have their own security releases, but these are not always scheduled, and often surprise updates. Plan Left makes it our priority to issue these security updates as soon as possible so that your website is as secure as possible.
Functional Codebase Updates
We apply all available code updates to your website on a monthly basis. This ensures that your plugins and codebase are never too far behind the latest release, which in turn ensures that your site is performant, secure, and you won’t spend extra time and money on getting up to date before you get started when you want to make improvements.
Front-End Malware and Intrusion Monitoring with Sucuri
Through our Sucuri agency partnership, we have enabled front-end malware monitoring. Sucuri keeps a database of known intrusions and their front-end symptoms. This scan runs several times per day, actively monitoring your site for known vulnerabilities and their symptoms, alerting our team if anything is found.
Server-Side Malware and Intrusion Monitoring with Sucuri
As with the front-end monitoring, the Sucuri database keeps track of back-end symptoms of known intrusions and has a monitoring service for these as well. We enable server-side monitoring for all of our sites from the first activation of hosting so that any detection of server-side intrusion incidents will alert our team.
Intrusion Remediation
From time to time, a zero-day incident, or a previously unknown intrusion may happen. Should we find any intrusion, we will remediate it immediately.
GIT Version Control
We further secure sites with GIT version control tracking. With GIT we can track custom components as well as community-contributed ones. By keeping track of our codebase in this way, we can always check if our site’s codebases have been modified in any way.
Server Side Firewall
The server-side firewall can be used with or without the external firewall. We offer both as a service, since an external firewall is not always a good fit for every application. When enabled with the external firewall, the server-side firewall acts to prevent unauthorized traffic or eavesdropping directly to the server itself.
Server-Side Caching
Caching helps mitigate low-level DDoS attacks, as well as assist in overall visitor experience and server performance.
Server Uptime and Performance Monitoring
Monitoring protocols for our servers ensure that our team is alerted if they reach periods of strain, extreme spikes in usage, and other performance indicators, as well as uptime monitoring for cases of downtime.
Website Uptime Monitoring
The website can experience downtime independently of the server. For this reason, we’ve enabled website uptime monitoring as well.
DNS Monitoring
Some types of malicious activities involve DNS changes. In other cases, DNS changes may happen on accident. This can encur potentially damaging results. For these reasons, DNS monitoring is part of our monitoring protocols.
SSL Monitoring
Because SSLs have become a modern standard for any website visitor experience, ensuring that we get alerted if they are down, as well as reducing response time, is extremely important.
Services Monitoring and Restart Protocols
Within the servers, and outside of the website, services like NGINX and MYSQL must keep running, even if they experience some form of interruption. To this end, we have protocols, which ensure that should these services ever stop, they are restarted automatically.
Website Backups
We take nightly screenshots of your website and database and retain those for 7 days at a time. If we ever need to restore any backup from the last 7 days, they are available to our team within a few clicks.
External Firewall
This automated, bot-powered firewall from our partner Sucuri has several facets of configuration that we can tailor to your sites and their individual needs. Its biggest and most prominent benefit is that when a DDOS attack begins, or when a malicious visitor is triggering the configured parameters, we don’t have to lift a finger for these offending parties to be blocked from the site.
Basic CDN and Caching Configuration
In addition to the benefits of any standard firewall, we also have a basic CDN enabled with this service, which allows further control over performance and user experience. This also helps keep the site performant if and when it is under a heavy load.
Full Scope System
From this point forward, you shouldn’t see many, if any, serious interruptions of service. With these protocols and redundancies that we’ve implemented to our hosting infrastructure, there are very few circumstances, if any, which could seriously affect your website’s performance.
Ongoing Improvements
Furthermore, if any of our hosted sites do experience any interruption of service, we hold the steadfast commitment to investigate and attempt to find a way to learn from such events, and implement fixes back towards our entire infrastructure.
Hosting Procedure Software
Finally, we use a custom software to keep track of our hosting updates, improvements, and website touchpoints. This software enforces rigorous process compliance, as well as keeping track of when each checklist is performed, and by whom. We hope to offer client-facing access to this software in the future, but are happy to demonstrate it at any time.