<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ModulesGarden Blog &#187; protection</title>
	<atom:link href="https://www.blog.modulesgarden.com/tag/protection/feed" rel="self" type="application/rss+xml" />
	<link>https://www.blog.modulesgarden.com</link>
	<description>Where Creativity Meets Technology</description>
	<lastBuildDate>Thu, 16 Apr 2026 11:45:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>How to protect your privacy in the 21st century</title>
		<link>https://www.blog.modulesgarden.com/world-backup-day-2023</link>
		<comments>https://www.blog.modulesgarden.com/world-backup-day-2023#comments</comments>
		<pubDate>Fri, 31 Mar 2023 10:15:03 +0000</pubDate>
		<dc:creator>Daria Śliwa</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS modules]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=9698</guid>
		<description><![CDATA[In the light of World Backup Day, we felt it’s only right to bring awareness to the ongoing issues concerning data loss. We feel the need to share the importance of safeguarding your data and keeping your devices secure. Throughout &#8230; <a href="https://www.blog.modulesgarden.com/world-backup-day-2023">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">In the light of <strong style="color: #d36635;">World Backup Day</strong>, we felt it’s only right to bring awareness to the ongoing issues concerning data loss. We feel the need to share the importance of safeguarding your data and keeping your devices secure.<strong><span id="more-9698"></span></strong></p>
<p style="text-align: justify;">Throughout the years, many people and organizations struggled with leaks or lost data, resulting in loss of customers, revenue and reputation, not to mention legal consequences. At this day and age, storing data varies from facial recognition thanks to AI and improved technology, to details about your bank account or address, which we don’t want to disclose. Whether you store your personal information, products and projects yet to be released or customer details – you should make sure all of it is <strong>properly saved</strong> and <strong>backed up</strong>.</p>
<p style="text-align: justify; padding: 33px; border: 2px solid #d36635; margin-bottom: 30px;">Some of the most memorable breaches due to backup issues, like the UK prison system, where sensitive information about over <strong>80K</strong> inmates has been leaked out, still weren’t a lesson for some. Even last year, over a decade after some of the largest data loss incidents, CashApp suffered a breach that resulted in leaking personal details about <strong>8.2 million</strong> clients and losing information they won’t be able to get back.</p>
<p style="text-align: justify;">Whether in this form or another, the word <strong style="color: #d36635;">&#8220;backup&#8221;</strong> simply should ring a bell to everyone these days. Essentially, it is a process of moving your data to a secure location. As an example, that being an <strong>USB stick</strong> or a <strong>remote server</strong>, it is used to store your original data and prevent the possible loss of it. Easily accessible storage is a convenient way for successfully saving and retrieving your data, which is a solid foundation to any online business. Nevertheless, you have to consider that in some cases it can also be accessed by an intruder, that’s why we recommend to distribute your data to <strong>a few secure locations</strong>.</p>
<p><a href="https://www.modulesgarden.com/products/whmcs/r1soft-backups"  target="_blank"><img src="https://www.blog.modulesgarden.com/wp-content/uploads/2023/03/World-Backup-Day-2023.png" alt="World Backup Day 2023 - R1Soft Backups For WHMCS by ModulesGarden" width="575" height="300" class="aligncenter size-full wp-image-9703"/></a></p>
<p style="text-align: justify;">We are aware that this may be a lengthy process for some, but it is also absolutely crucial to protect your data. Due to the amount of breaches and consequences mentioned above, we offer <span style="text-decoration: underline;"><a href="https://www.modulesgarden.com/products/whmcs/r1soft-backups" target="_blank"><strong style="color: #d36635;">R1Soft Backups For WHMCS</strong></a></span> to help prevent that happening to your most valuable asset &#8211; your clients.</p>
<p style="text-align: justify;">As stated earlier, well executed security plays a large role in building a successful business, not least in terms of fostering rock-solid customer relationships, which is why R1Soft Backups For WHMCS focuses specifically on providing your clientele with <strong>R1Soft Server Backup Manager</strong> accounts configurable in every key aspect, such as the size or the type and level of compression. At the same time, you will get to create as many R1Soft packages as it feels right for you as well as perform basic management right where the pulse of your business is most felt &#8211; in your WHMCS.</p>
<p style="text-align: justify;">With all of that in mind, we are hoping you will always be cautious and make sure your data is stored in a safe place. Don’t hesitate to check out our module and invite the future of <strong>server data protection</strong> to your offer! </p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/world-backup-day-2023/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Find The Guardian Of Your Data Privacy</title>
		<link>https://www.blog.modulesgarden.com/data-privacy-day</link>
		<comments>https://www.blog.modulesgarden.com/data-privacy-day#comments</comments>
		<pubDate>Fri, 26 Jan 2018 12:30:49 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=4926</guid>
		<description><![CDATA[The Internet is home to a tempting variety of conveniences, many of which have permanently entered mass consciousness and settled into everyday routines. That same facilities jostling for your rapt attention within the comfy confines of your web browser may, &#8230; <a href="https://www.blog.modulesgarden.com/data-privacy-day">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">The Internet is home to a tempting variety of conveniences, many of which have permanently entered mass consciousness and settled into everyday routines. That same facilities jostling for your rapt attention within the comfy confines of your web browser may, however, easily fool you into dropping your guard and lull you into a false sense of security. <strong>The Data Privacy Day</strong> is on the horizon to remind us all about the paramount gravity of safeguarding the privacy of each single slice of personal information thrown into the cyberspace.<strong><span id="more-4926"></span></strong></p>
<p style="text-align: justify;">In response to the global threat of data breaches and ever more privacy violations committed in a digital sphere, the countries worldwide mobilize each year on 28th January to foster strong awareness and promote current best practices in widely approached protection of online safety. The Data Privacy Day leads an international initiative to fully recognize the long-term impact on the society of the established customs of data collecting and sharing. The ultimate objective is to <strong>educate individuals on how to safely define and control their online presence</strong>, and <strong>guide companies how privacy kept intact works greatly in favor of their business integrity.</strong></p>
<p style="text-align: justify;">The ideological focus of this irreproachable campaign continually expands, inspiring not only dialogue but also decisive actions on many instrumental levels. In the information technology field, the chief effort is targeted at <strong>tackling the shortage in sufficiently advanced software</strong> aimed to render the safe data storage and management less of a challenge, and more of an effortless habit.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-4928" style="padding: 0px; border: 0px none;" src="https://www.blog.modulesgarden.com/wp-content/uploads/2018/01/Data-Privacy-Day-ModulesGarden.png" alt="Data Privacy Day - ModulesGarden" width="576" height="576" /></p>
<p style="text-align: justify;">Among the wide choice of techniques commonly deployed to preserve online privacy, <strong>encryption of personal data</strong> is regarded as the absolute fundamentals. As early as almost two decades ago, Lawrence Lessig, in its revealing book, <em>Code and Other Laws of Cyberspace</em>, hailed encryption technologies as „the most important technological breakthrough in the last one thousand years”. Whether Lessig exaggerated or not, we leave it for you to decide, but he surely have got a point, placing well-deserved emphasis on the prominent role of encryption in today’s digitally dominated world.</p>
<p style="text-align: justify;">Simply put, encryption converts pieces of information into another form or code, so that only people who own a decryption key or password can access them. It comes in a great number of types, each with a different mechanism to obscure the data into unreadable content. A popular criterion to classify software encryption is the central purpose it fulfills. From this perspective, technology may be grouped into the tools that encrypt <strong>&#8220;data in transit&#8221;</strong> and ones that encrypt <strong>&#8220;data at rest&#8221;</strong>. The basic difference between them is that the first encryption category pertains to transfers of information, while the second one deals with its storage. Whether they travel across the Internet or through a private network, data is quite rightly considered less secure while in motion, and thus, strict encryption measures for in-transit details are nothing short of a must when building a software armor.</p>
<p style="text-align: justify;">To fully grasp the concept of data transit, simply think of the last time you shared some password with your colleagues using the most ordinary channel possible &#8211; an email. Now, imagine the consequences of this tiny string of characters falling into the wrong hands. A direct blow to your reputation and brand image, hordes of frustrated customers, not to mention the organizational mayhem or, in the worst-case scenario, the complete closure of your business. Terrifying, isn’t it? To prevent any of this from happening, robust software with a sophisticated encryption formula should be implemented and actively used. The tool worthy of careful note in this regard is <a href="https://www.modulesgarden.com/products/whmcs/password-manager"><span style="color: #3f95d5;"><strong>Password Manager For WHMCS</strong></span></a> that features two-way encryption keys converting the sensitive information into code on the fly, so that only its unreadable format is saved in the database. Having the passwords under such top-level protection, neither any storing nor sharing operations will pose a real risk to the enterprise and its clientele.</p>
<p style="text-align: justify;">In the face of ever new social networks to be launched, new applications to be released, and new experiences to be had deep in a digital realm, we all bear a heavy responsibility to embrace all irreversible outcomes of this evolution and ensure that any cyber-valuables we care of are protected both when stored and across transit endpoints. The application of space-age encryption technology is a box all smart companies need to check, no matter their size.</p>
<p style="text-align: center;"><strong>Have you already checked yours?</strong></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/data-privacy-day/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Grand Your Data The Gift Of Full Protection!</title>
		<link>https://www.blog.modulesgarden.com/world-backup-day</link>
		<comments>https://www.blog.modulesgarden.com/world-backup-day#comments</comments>
		<pubDate>Thu, 31 Mar 2016 14:45:14 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=2769</guid>
		<description><![CDATA[Whether it is intentional or by accident – the merest click can become a real culprit behind a digital fiasco. A fleeting moment of inattention that turned into a drink spilled on your laptop might also be a potential headache &#8230; <a href="https://www.blog.modulesgarden.com/world-backup-day">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Whether it is intentional or by accident – the merest click can become a real culprit behind a digital fiasco. A fleeting moment of inattention that turned into a drink spilled on your laptop might also be a potential headache of your data being gone beyond retrieval. These, alongside the other types of risks are counted in thousands in today&#8217;s electronic-based reality, but they all can be averted successfully by following one good practice – <strong>a solid strategy of making regular data backups.<span id="more-2769"></span></strong></p>
<p style="text-align: justify;">In honor of World Backup Day that falls on March 31st, we wish to share with you our winning formula for maintaining foolproof data protection.</p>
<p style="text-align: center;"><img class=" wp-image-2781 aligncenter" style="padding: 0px; border: 0px none;" src="https://www.blog.modulesgarden.com/wp-content/uploads/2016/03/ModulesGarden-World-Backup-Day-2016.jpg" alt="ModulesGarden World Backup Day 2016" width="580" height="580" /></p>
<p style="text-align: justify;">What you should do in the first place is realize that it is not just computers that serve as a data repository anymore. These are also smartphones, tablets and plenty of different devices in everyday use that store huge amounts of information, the loss of which might turn out severely damaging to either your personal or business sphere (or both!). It is therefore of utmost importance to think ahead and ensure the perfect safety of documents, photos, videos, emails and absolutely anything of digital kind that you value.</p>
<p style="text-align: justify;">So how exactly can you prepare for the unexpected? A whole myriad of options exists for you to protect your files against any loss. The more of these methods you introduce to your usual routine, the smaller the risk of ever suffering the trauma of data disappearance will be.</p>
<p style="text-align: justify;">Simply put, a backup is an exact copy of your intangible valuables. Instead of keeping them all in a single place, you store a separate copy of each file somewhere safe. Conventional wisdom has it that your digital content can be utterly secured upon the adoption of <strong>the backup rule of three</strong>, also known as the 3-2-1 rule:</p>
<ol>
<li>Have at least 3 copies of your data (i.e. two backup files in addition to the original content).</li>
<li>Store the backups on 2 different media types (such as USB drives, optical media, SD-cards, external and internal hard drives, etc.).</li>
<li>Keep 1 backup off-site (ensure that the copies are saved on physically separated devices – the farther the better!).</li>
</ol>
<p style="text-align: justify;">Take some time to cruise through different backup mechanisms and alternative solutions like <span style="text-decoration: underline;"><a href="http://www.modulesgarden.com/products/whmcs/r1soft_backups/features" target="_blank"><span style="color: #3366ff; text-decoration: underline;">this one</span></a></span>, to decide which approach suits you and your clients the most. Regardless of your choice, keep in mind: it is not just about backups, it is about your personal well-being and business continuity!</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/world-backup-day/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Take Care Of Your WHMCS!</title>
		<link>https://www.blog.modulesgarden.com/whmcs-analyzer</link>
		<comments>https://www.blog.modulesgarden.com/whmcs-analyzer#comments</comments>
		<pubDate>Wed, 24 Feb 2016 19:40:26 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=2594</guid>
		<description><![CDATA[You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you &#8230; <a href="https://www.blog.modulesgarden.com/whmcs-analyzer">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you protect the health of your WHMCS?<strong><span id="more-2594"></span></strong></p>
<p style="text-align: justify;"><strong style="text-align: justify;">WHMCS Analyzer</strong> has been created to help you monitor the shape of your technical infrastructure in a very detailed fashion. The script has been armed with a wide scope of advanced algorithms to scan your system and server environment from every angle possible. This way, you can easily determine its current status and address any suspicious aspects before they inflict any damage to your business. The examination outcome will also prove useful for assessing to what extend your WHMCS has been modified, i.e. how many custom files it contains.</p>
<p style="text-align: justify;"><a href="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png"><img class="alignnone  wp-image-2598" src="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png" alt="ModulesGarden WHMCS Analyzer - Server Environment" width="993" height="1068" /></a></p>
<p style="text-align: justify;">Download the script <strong><span style="color: #6198fd;">entirely for FREE</span></strong> to keep a finger on the pulse of your system operation and run your business without any risk of technical failure!</p>
<p style="text-align: justify;"><span style="display: block; text-align: center;"><a style="text-decoration: none; display: inline-block; margin: 28px 0px 28px 0px;" href="http://www.modulesgarden.com/products/whmcs/whmcs_analyzer/features"><span style="-webkit-border-radius: 3px; -moz-border-radius: 3px; border-radius: 3px; background: #6198fd; color: #ffffff; padding: 15px 20px; text-decoration: none;"><strong>Learn More!</strong></span></a></span></p>
<div id="balloon_parent_div_ab" class="kisb" style="visibility: hidden; position: absolute; left: 333px; top: 307px;">
<div class="kl_abmenu">Dodaj do listy blokowanych banerów</div>
</div>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/whmcs-analyzer/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Practical Tips To Defend Against DDoS Attacks</title>
		<link>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks</link>
		<comments>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks#comments</comments>
		<pubDate>Wed, 29 Apr 2015 14:03:27 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1834</guid>
		<description><![CDATA[Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, &#8230; <a href="https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, then there is a strong possibility that you have become yet another victim of  Distributed Denial of Service (DDoS) attack.<strong><span id="more-1834"></span></strong></p>
<p style="text-align: justify;">DDoS attacks have become one of the most common disastrous attacks on the Internet. The number of attacks along with their size and intensity has increased substantially: in the space of just last year 57% rise in total DDoS attacks have been reported. That is why we want to share with you some of practical tips to defend against DDoS attacks and actions worth taking while experiencing the attack to minimize losses:</p>
<p style="text-align: justify;"><strong>1.</strong> One of the well-known approaches to handling DDoS attacks is over-provisioning. In order to scotch the attack and reduce its impact on your clients you need to provision for far more traffic than you usually expect to receive. How much should be enough? Estimate the largest amount of traffic that you have ever had, multiply it by ten and adapt your hardware infrastructure to cope with this level of traffic. It will make much more difficult for an attacker to generate enough traffic to bring down your company&#8217;s network.</p>
<p style="text-align: center;"><img class="size-full wp-image-1835 aligncenter" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Country.png" alt="DDoS Attacks In Q4 2014 Per Country" width="534" height="480" /></p>
<p style="text-align: justify;"><strong>2.</strong> If you are experiencing DDoS attack you need to consider disconnect<span style="font-size: medium;">ing</span><span style="font-size: medium;"> from a network. It will result in </span><span style="font-size: medium;">taking your business off-line and </span><span style="font-size: medium;">cutting off access to all your products and services but at the same time it will prevent from further utilizing network resources.</span></p>
<p style="text-align: justify;"><strong>3.</strong> Additionally, you can perform DNS redirection by changing an &#8220;A&#8221; record which provides servers with the IP address of your domain. Keep in mind that you have to notify your clients about it so they can enter new IP address in order to keep using services of current network provider. This method is as effective as quickly DNS propagation is proceeded. It may take even a few hours and often requires a direct contact with a hosting service provider.</p>
<p style="text-align: justify;"><strong>4.</strong> IP addresses are cached by servers around the world for a specific period of time (measured in seconds) which is known as &#8220;Time to live&#8221; (TTL). Usually, default TTL value is 86400 seconds (24 hours), which may be far too long if you are under DDoS attack. You can reduce losses by controlling TTL value: the shorter TTL value, the quicker you will be able to redirect all web site requests to a new IP address. You need to, however, bear in mind that shorter TTL value means more frequent requests which, in turn, increases the load on your DNS host.</p>
<p style="text-align: justify;"><strong>5.</strong> Changing DNS or even migrating to another server may be not sufficient to completely resolve the problem. If an attacker finds out what your intentions are, the attack will be redirected to a new target and everything may start all over again. Therefore, it is also worth giving some thought to cloud-based traffic scrubbing services which are able to quickly filter out malicious software from data stream. Data cleansing service providers are the first line of defence against high-volume DDoS attacks &#8211; they have sufficient bandwidth and proper tools to filter network traffic which stems DDoS packets within the cloud and pass normal traffic to the company network.</p>
<p style="text-align: center;"><img class=" wp-image-1836 aligncenter" title="DDoS Attacks In Q4 2014 Per Industry" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Industry.png" alt="" width="533" height="532" /></p>
<p style="text-align: justify;"><strong>6.</strong> You may also take into consideration some additional services, such as CloudFlare. They monitor network traffic and collect data that are used as a basis to assess the risk of possible attacks. Thanks to this, each attack attempt is thwarted before it does any damage. What is more, in case of a serious attack, they are able to restore a webpage and revert back any negative changes using previously made backup files. This way, users may not even notice the malfunction.</p>
<p style="text-align: justify;">Destructive power of DDoS attacks cannot be disregarded. <span style="font-size: medium;">Every company needs to ensure its</span> sustained operation <span style="font-size: medium;">and resource availability by remaining vigilant and taking all possible measures </span><span style="font-size: medium;">to mitigate the risk of </span><span style="font-size: medium;">being hit before it happens.</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Security? Yes Please!</title>
		<link>https://www.blog.modulesgarden.com/more-security-yes-please</link>
		<comments>https://www.blog.modulesgarden.com/more-security-yes-please#comments</comments>
		<pubDate>Fri, 03 Oct 2014 11:01:26 +0000</pubDate>
		<dc:creator>Piotr Dołęga</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1466</guid>
		<description><![CDATA[A month ago we introduced a brand new new licensing system to increase the security and stability of our modules. That was just the beginning of the internal improvements in our company. The next step is making sure that your &#8230; <a href="https://www.blog.modulesgarden.com/more-security-yes-please">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">A month ago we introduced a brand new new licensing system to increase the security and stability of our modules. That was just the beginning of the internal improvements in our company. The next step is making sure that your valuable data are perfectly safe.<strong><span id="more-1466"></span></strong></p>
<p style="text-align: justify;">Recently we have added a completely new functionality to all of our ticket&#8217;s submitting forms. This is a nice, green field with ‘Secure Message’ title.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-1470" src="https://www.blog.modulesgarden.com/wp-content/uploads/2014/10/ModulesGarden-Support-Secure-Message.png" alt="ModulesGarden Support - Secure Message" width="714" height="1366" /><br />
All data filled in that field are additionally encrypted and stored on a secured server. In this way, your confidential data, like access details to your system, will be even safer than before.</p>
<p style="text-align: justify;">Do not hesitate to make good use of this attribute! <img src='https://www.blog.modulesgarden.com/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/more-security-yes-please/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Improvements Of Security And Stability</title>
		<link>https://www.blog.modulesgarden.com/improvements-of-security-and-stability</link>
		<comments>https://www.blog.modulesgarden.com/improvements-of-security-and-stability#comments</comments>
		<pubDate>Fri, 29 Aug 2014 14:34:56 +0000</pubDate>
		<dc:creator>Piotr Dołęga</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1406</guid>
		<description><![CDATA[A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new &#8230; <a href="https://www.blog.modulesgarden.com/improvements-of-security-and-stability">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new solution that was supposed to drastically improve the security and stability of our services, especially the modules.<strong><span id="more-1406"></span></strong></p>
<p style="text-align: justify;">And so it happened. Today we finished the first phase of the plan through reorganising our whole server and network structure, and applying security improvements. That will result in minimization the risk of downtimes and interruptions in the delivery of services. But most importantly, we finished the massive update of all the modules to implement a far better license verification mechanisms. In this way, even if the licensing servers are down, the proper work of your modules will not be interrupted.</p>
<p style="text-align: justify;">To benefit from the mentioned improvements you will need to upgrade your modules. To do so, simply log in to our <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="ModulesGarden Client Area" href="https://www.modulesgarden.com/manage/" target="_blank"><span style="color: #3366ff; text-decoration: underline;">client area</span></a></span></span>, download the latest versions released today (29.08.2014) and follow this simple <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="How To Update Modules" href="http://www.docs.modulesgarden.com/Modules_Update" target="_blank"><span style="color: #3366ff; text-decoration: underline;">instruction</span></a></span></span>.</p>
<p style="text-align: justify;">Please note, that you do not have to update the modules, but it is highly recommended.  In case you do not update your modules, we can not guarantee you the adequate stability at the time of serious server failures. However, they will work correctly. The decision belongs to you but we are convinced that there is no reason to postpone this task.</p>
<p style="text-align: justify;">Soon, we will implement additional improvements like for example secure message system into our ticket system. It will further enhance the safety of your valuable data provided in the tickets. We will keep you posted.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/improvements-of-security-and-stability/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
