pairBlog

Web Hosting Tips + Tricks + News

Tag

wordpress

lock it down featured image
Design & Development, Security, WordPress

Lock it Down: How to Keep Your Site Secure

In an era where websites are compromised by malicious software all the time, one of the most common security questions is ‘How do I help protect my site from hackers?’ Although it can seem daunting, there are plenty of steps you can take to help keep your site secure. How to Keep Your Site Secure Keep it Fresh Always keep your platforms (like WordPress, Drupal, etc.) and their associated plugins up to date with the latest versions. Having outdated software is one of the easiest ways for malware to break into your site. Think of an old version of WordPress…

Continue reading
cms featured image
Design & Development, Drupal, Joomla, WordPress

Content Management Systems: Joomla, Drupal, & WordPress

If you are looking to build a dynamic website without having to worry about the coding and technical aspects of it; WordPress, Joomla, and Drupal have established themselves as the leaders for online content management systems. Comparing Content Management Systems No one CMS is better than another. It largely depends on your situation, site goals, and skill level. WordPress, Joomla, & Drupal What is a Content Management System? Otherwise known as a CMS, it is a system used to manage the content of a website. It allows the account holder who may not be familiar with coding, to manage the…

Continue reading
common wordpress problems and solutions blog header against wood desk background with laptop and coffee cup
WordPress

5 Common WordPress Problems and Solutions

WordPress is a powerful tool for creating, managing, and sharing your content. But even powerful tools need maintenance and a little help troubleshooting problems. If you want to simplify your WordPress launch, you can get a ready-out-of-the-box solution from a reliable web host.

Continue reading
our 10 favorite wordpress plugins: improve your wordpress site's visibility, usability, and more! white text against black background in front of deconstructed laptop
WordPress

Our 10 Favorite WordPress Plugins

WordPress offers over 55,000 plugins to its users. Your site would probably crash if you tried all of the WordPress plugins available and you don’t have time to waste testing Worthless Plugins. So, here are several of our favorite (and useful) WordPress plugins:

Continue reading
featured image
Design & Development, How To, Security

How to Serve Your Site Over HTTPS

How to Serve Your Site Over HTTPS A site served over https is more secure. Since https uses the secure port 443, which encrypts outgoing information, it is much more difficult for people to spy on your site’s information. Regular http, on the other hand, uses port 80, which sends information via plain text. Plain text can easily be compromised during transit and by using it, you risk exposing your site and its visitors’ information to the world. However, in order to use https, you will first need an SSL certificate. For more information about SSL certificates, see our What…

Continue reading
WordPress Hosting 101 Featured Image
Web Hosting

WordPress Hosting 101

So you want to start a WordPress site? Great! Now you have to decide how you want to host your new site. Figure Out What You’ll Be Doing Do you want your site to be a blog? An e-commerce site? A combination of both? The options are endless! Sit down and think about what you want to do with your site. Once you’ve decided, consider the design you’d like for your site. Do you prefer complex themes with lots of functionality or simple ones? Are you planning on using a lot of plugins or just one or two? These are…

Continue reading
Securing WordPress
Security, WordPress

Securing WordPress Sites

When performing a self-installation of WordPress, there are easy steps that can be taken to help protect against an attack.  Many of the cases our Abuse Department deals with on a daily basis are the result of malicious WordPress attacks. Securing WordPress will make it much harder for malware to gain access.

Continue reading