For most beginners, transferring files between computers means getting a thumb drive or any other external storage device, copying the files from the source computer onto the device, inserting that device into the other computer and then moving the files to the desired folder. Yes, this process works and is a really secure way of moving files without any fear of it getting intercepted. Unfortunately, this process can eat up so much time and effort. Plus, it means that one has to physically go to the computers. The problem will arise if the locations of the machines are too far away. It is still possible but this process then becomes too impractical. For these instances, SSH becomes relevant.

An introduction on SSH

What is SSH anyway? It refers to Secure Shell. It is a protocol that allows secure communications between computers. It is typically used for connecting to the Web without 3rd party intrusions. Basically, it only allows authorized users to access information on the designated computers. SSH works with Unix, Linux, and Windows OS.

You may not need SSH

Protection from prying malicious eyes is a good thing. However, there are instances when SSH is really not that important. If you only wish to make a startup website that can be seen by all, there is no need for SSH. However, for business sites and other websites that deal with sensitive information, SSH becomes necessary to keep fraudsters and hackers at bay. How do you know if investing on SSH is necessary? Consider the following:

  • You need SSH when the data in your website can be valuable to people who are outside your organization. This can be in the form of bank records, login IDs and passwords, payment information, etc.
  • You need SSH when you have information that only your users or personnel should access. This could be employee records, credit card information, salary computations, and the likes.

Steps you can take to ensure file and data safety

After taking the security needs of your website into consideration and concluding that you require SSH, it is time to learn some tricks to make sure that the protocol works effectively. Hackers are getting smarter each day and they have found ways to undermine the protection offered by SSH. Make sure that you follow these tips to strengthen your Security Shell:

1. Disable the open server for SSH. The computers will be functional.
2. Do not use SSH version 1. There are security issues with the first version so make sure that you are using Protocol
3. Check the restrictions on who can access the SSH. Make sure that the restriction is not set to the default setting.
4. Do not let your SSH go unmanned. Configure the timeout interval.
5. Choose your SSH password wisely. These measures will be deemed useless if the hackers can easily guess the password you choose.

Are iPage’s security measures enough?

iPage does not feel that their clients would require more protection than what they are currently providing. This is one of the reasons why the company does not support SSH. Additionally, configuring SSH can be difficult for people with no training. Since iPage caters to all sorts of web developers, even novices, they want to provide services that are easy to understand and use. Luckily, there are security measures already in place so that iPage clients will not need to worry about their information getting seen or stolen by unauthorized entities. Here are the security measures taken by iPage:

  • Use of SiteLock security suite
  • Regular scanning of network
  • Daily scans for spam and malware