
How to keep your website secure
Introducing ImunifyAV and ConfigServer eXploit Scanner (CXS) for cPanel-Strengthen Your Site Security
Stopping malware at the server level is crucial aspect of protecting your computer networks, with 1 in 13 web requests leading to malware infection. The average time to recover from a cyberattack is 50 days and this is costly.
What is ImunifyAV?
ImunifyAV is an intelligent antivirus security monitoring tool for websites with one-click automatic malware cleanup, domains reputation monitoring and blacklist status check. For the protection of your websites, it is crucial to keep malicious code out of your files, whether it is from PHP (WordPress, Joomla, or Drupal), or classic, static HTML. This free malware scanner thoroughly scans your files and identifies any malicious code. It will notify you if there are problems with your websites.
Integrating ImunifyAV will give cPanel & WHM the benefit of automatic scans of hosted websites, alerting for infection with malware. If any websites are found to have malware on it, the user will receive a notification through the ImunifyAV control panel. The user will be asked to choose to clean the infection themselves or upgrade to ImunifyAV+ to have the infection removed automatically by the software.
What is ConfigServer eXploit Scanner (CXS)?
ConfigServer eXploit Scanner (CXS) is a tool that performs an active scanning of files as they are uploading on your server while blocking every suspicious file. It is a necessary tool for hosting security and protection against any malicious activity.
The active scanning of uploaded files helps prevent exploitation of an account by malware, by deleting or moving suspicious files to quarantine before they become active.
CXS also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses, and suspicious resources (files, directories, symlinks, and sockets). You can run scans of existing user data to see if exploits have been uploaded in the past or via methods not covered by the active scanning. It has been tuned for performance and scalability.
These tools are aimed at preventing compromises on websites hosted on your server and help to ease the repair in the event of compromise. These are a few of the tools we use at dev2host, to keep your data secure.