- About Us
IT security is not only about online hacking. You could simply lose a mobile phone, or have a hard drive die. There could be a break-in at your business premises.
Here's some food for thought:
Although our clients are mostly at the smaller end of the business spectrum, some have suffered from ransomware attacks, hacked computers, data loss, failed hard drives. A very few clients have had their websites hacked (their websites were NOT built by SuttonNet!): eg a hacked PC led to CMS login credentials being stolen.
There are simple sensible steps that you can take, without breaking the bank.
The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems.
You've made a good start, hosting your website with SuttonNet. Our server is designed for and dedicated to SuttonNet use. There are no anonymous hackers sharing your website's host server and seeking to infiltrate other sites there. We know our clients, and we fully control and strictly limit access to the server interface.
Our web server infrastructure is managed by professionals with a long history and high reputation in business web, data and email hosting.
All web software is NOT equal when it comes to security. Some well known names have a long history of internal weaknesses & bugs that have led to hundreds of sites being hacked. Bizazz is on the high-security end of the spectrum. Bil Sutton, who wrote the Bizazz software, worked on computer systems in Finance, Immigration & other key Commonwealth Government departments. That's a good foundation!
Your webpages are only secure if your own computer is free of malware that might read your passwords, keystrokes or more. Choose a good operating system that won't be easily compromised, and keep any anti-virus ware up to date. Also keep your Bizazz content management system login credentials safe.
Think about what information is in your business emails, where this is stored (including emails forwarded from your business's own-domain email address to your other email accounts) and who might be able to access it, in your workplace or beyond. It's up to you to control access to devices that contain your emails.
IMAP email hosting stores your email on the mail server as well as on your computer/phone. Our email hosting service encrypts all emails stored on the server.
For POP accounts, new emails are stored temporarily on the mail server. Otherwise, all mail for a POP account is stored only on your phone/computer.
Last updated 27 September 2022