precautions while using websites

Precautions while using Websites

Things You Shouldnt Give Social Networking Sites While websites like Facebook and My Spacemake.
41. Copyright And permissions
Once you publish multimedia content on the Internet, it becomes subject to copyright and permissions laws. To protect your legal standings, take precautions to ensure that your content does not violate the rights of an individual or organization. Verify that you have the rights to use content, including music tracks, video clips, logos and images. If you interview subjects for video or audio content, obtain signed releases before putting it online.
42. Exclusions
The Company assumes no responsibility whatsoever for any trouble, loss or damage resulting from use of information on the Website or the Website.The Company pays close attention to information on its Website so as to protect against any errors and omissions, etc. However, inaccurate description or inappropriate information such as misprints may be included in information on the Website, and the Company shall not guarantee such accuracy and completeness. Also the Company assumes no esponsibility whatsoever for any failures caused by improper operation of a computer, falsification of data by a Third Party or downloading of data from the Website for any reason whatsoever.
43. Encryption
Encryption is a method of turning data into something, which, if it was intercepted, would be impossible to read. A program which decrypts the data using a key is needed to unlock the real meaning of the data. Data which is sent to banking websites is encrypted with very secure methods.
44. Security protocols
Secure Sockets Layer SSL is the leading security protocol on the internet. This is a method of creating encrypted connections for sending personal data. If you have ever used online banking, or purchased items online, then an SSL connection is created.
45. Firewalls
A firewall controls incoming and outgoing traffic. It checks the data to see if it should be allowed through or not. The user can alter a firewall to block or allow certain websites.
46. Security suite
This is a suite of programs that provides protection against different malware. It will contain a firewall, virus scanner, pop up blocker and anti phishing components. It is a one stop shop against all of the security risks we face online.
47. They must have a backup system in place
The backup system must be automating daily backups and you will need easy access to the backups in case you need to do a site restore. Recommend they set their site up on ManageWP or offer to set them up on your account or use BackupBuddy or VaultPress, all of which are tailor made for WordPress. Make sure you dont collect login info to anything they own until they confirm their site is being backed up! You do not want anyone to be able to point fingers at you if anything goes wrong, just because you had access, even if it wasnt you who did the deed. Its not worth the pocket change to take on a job without this requirement.
48. Compromised devices
Compromised laptops and other devices may also be connected to the local network. When connecting, be sure to select the Public network Wi Fi option in Windows and not the Home network or Work network options. The Public network option locks down the connection, ensuring Windows isnt sharing any files or other sensitive data with the machines on the local network.
49. Rotate all passwords
All passwords including FTP, database and of course site admin passwords should be updated on a regular basis. We recommend monthly if you access your website regularly.You should also have a reasonable password policy in place that includes passwords must not be re used, do not use the same password for everything, make sure passwords are a minimum of 8 characters and is a combination of uppercase, lowercase, numbers and symbols.
50. Backup your files
It is important that you dont just rely and assume your hosting provider will have a backup of your website that they can immediately recover for you, especially at no charge. Generally speaking hosting providers do backup data, but they do this in the case of a disaster they are able to get all customers back online. The backup sizes dealt with are in the many many Terrabytes and for them to delve into those archives, find files for an individual user, quite often from a specified date, takes time and requires qualified systems administrators to do the work, often requiring them to stop doing other tasks to complete the recovery request. This is why most hosts charge you to recover data. So we strongly recommend that you backup. A simple task that will save you a lot of headaches later.