Security

Advice and information on protecting your servers, systems, and websites.

Displaying all 8 posts

Beyond Uptime: The Importance of Comprehensive Website Monitoring

Posted 17 days ago on the DeployHQ blog

In today's digital age, a website is often a business's most valuable asset. Ensuring its reliability and performance is crucial for customer satisfaction and search engine rankings. While many website owners focus solely on uptime, there are other critical metrics that can significantly impact a website's success.

What is DevOps?

Posted 27 days ago on the DeployHQ blog

DevOps is a software development methodology that merges development (Dev) and operations (Ops) teams to streamline the software development lifecycle. By fostering collaboration, automation, and continuous improvement, DevOps empowers organizations to deliver high-quality software more rapidly and securely.

Deploying Behind Firewalls Made Easy: Introducing the DeployHQ Agent

Posted on the 14th October on the DeployHQ blog

Ever wished you could seamlessly deploy your code to servers tucked safely behind a firewall? At DeployHQ, we understand the importance of security, and that often means keeping your servers isolated from the outside world. But what about when it comes to pushing new code updates?

Is FTP Dead? A Look at Its Continued Use in Deployment

Posted on the 7th October on the DeployHQ blog

FTP (File Transfer Protocol) has been around for decades, serving as the backbone of file transfers across networks. While newer protocols like SFTP and FTPS have emerged, FTP remains a widely used method, particularly in certain deployment scenarios. Let's explore some of the common use cases where FTP continues to hold its ground.

Protecting Your API Keys: A Quick Guide

Posted on the 12th September on the DeployHQ blog

API keys are essentially digital keys that grant access to sensitive data and functionalities within your applications. Exposing these keys can lead to serious security breaches, allowing unauthorized individuals to manipulate your systems, steal data, or even launch attacks.

Securing Your Deployments: A Checklist Based on OWASP

Posted on the 5th September on the DeployHQ blog

Deployments are the lifeblood of any software development process, but they also present significant security risks. A compromised deployment can lead to data breaches, system downtime, and reputational damage. That’s where the Open Web Application Security Project (OWASP) comes in.

5 Ways to Create SSH Keys from the Command Line for DeployHQ

Posted on the 26th August on the DeployHQ blog

SSH keys are essential for securely connecting to your servers. DeployHQ allows you to upload custom SSH keys to manage your deployments. In this blog post, we'll explore 5 different ways to create SSH keys from the command line, each with its own algorithm and configuration options.

Keeping your DeployHQ account secure

Posted in January 2023 on the DeployHQ blog

DeployHQ offers many security configuration options for your account, such as enforcing two factor authentication, IP restricted access, and granular user restrictions.