Nexcess Logo

Nexcess Knowledge Base

Knowledge Base Home
|
Category : security
February 23, 2023

How to set up and configure Magento 2 reCAPTCHA

How to set up and configure Magento 2 reCAPTCHA
The Google reCAPTCHA extension is more secure than CAPTCHA for authenticating your website visitors. This article will explain how to set up Magento 2 reCAPTCHA for your online store.
February 15, 2023

Magento 2 registrations — how to stop/prevent spam bots

Magento 2 registrations — how to stop/prevent spam bots
Learn what Magento 2 spam bots are and how to recognize them. Then, let's discover eight methods to help prevent spam bots from infecting your Magento 2 ecommerce website.
February 07, 2023

Strong password rules: enforcing strong passwords in WordPress

Strong password rules: enforcing strong passwords in WordPress
Nexcess has compiled this article to help you harden your overall user password security for the WordPress platform by implementing and enforcing strong password rules.
February 06, 2023

Restricting access to the WordPress Administration Panel

Restricting access to the WordPress Administration Panel
To ensure only authorized users can make changes to your website, you need to restrict access to the WordPress Administration Panel/Dashboard. Let's review how in this article.
January 27, 2023

How to view your Nexcess account ID number and account PIN number

How to view your Nexcess account ID number and account PIN number
For security purposes, all Nexcess web hosting accounts have a six-digit PIN number. Viewing and changing your account PIN number can be done in the Nexcess Client Portal.
January 24, 2023

How to manage WordPress plugins

How to clean up, remove, and manage WordPress plugins
In this article, we will learn how to manage WordPress plugins, including how to remove the unused ones properly to ensure our website is not overloaded with any residual data.
January 10, 2023

DMARC email security: improving your email security infrastructure

DMARC email security: improving your email security infrastructure
This article gives an overview of the DMARC email security and authentication protocol that you should leverage to improve your email security infrastructure.
January 09, 2023

Using HTTP security headers to avoid web vulnerabilities

Using HTTP security headers to avoid web vulnerabilities
This article will explain HTTP security headers, recommended best practices, and how to enable HTTP security headers to secure your website from vulnerabilities.
January 06, 2023

Adding Google reCAPTCHA to your WooCommerce store

Adding Google reCAPTCHA to your WooCommerce store
Using Google reCAPTCHA is one of the best ways you can protect your ecommerce website from spam bots. Learn what Google reCAPTCHA is and how to add it to your WooCommerce store.
December 28, 2022

Secure Shell (SSH) user setup, access, and FAQ for the Nexcess Cloud

Secure Shell (SSH) user setup, access, and FAQ for the Nexcess Cloud
Secure Shell (SSH) users on the Nexcess Cloud have a particular configuration that customers may not be used to. SSH user setup was done in such a way to help with ease of use for teams.
We use cookies to understand how you interact with our site, to personalize and streamline your experience, and to tailor advertising. By continuing to use our site, you accept our use of cookies and accept our Privacy Policy.