HostMonster Web Hosting Help

Network Security Vulnerabilities

What is it?

Network servers have devices on them known as ports. Each port is set up to understand a certain type of language. There are ports, for instance, for database applications, website content, e-mail, instant messaging/chat, etc. They are similar to channels on television or a CB radio. Each port is either open or closed to the outside world, meaning it will "listen" to requests for that type of service. If a port is open, it is an opportunity for a hacker to attempt to access data or files on that server. Some ports need to be open, such as the port for web content on your Internet server. Opening unnecessary ports can expose sensitive data and systems to hackers.

What is the impact?

If hackers are able to access your network, the damage they can do is extensive. Depending on what parts of the server/network they reach, they could steal data, deface your website, or worse.

How does SiteLock protect me?

SiteLock checks each port (thousands) on your servers to make sure that only the appropriate ones are open for the type of server you are using (e-mail ports for e-mail servers, web ports for web servers, etc.). We'll notify you if anything looks out of the ordinary so you can correct the issue.

What can I do about it?

Close all unnecessary ports. Make sure your ports that are open are protected using strong security. Use a website scanning service that includes network scanning, such as SiteLock. Sitelock's Expert Services team can also help you lock down your network to prevent attacks.

Knowledgebase Article 2,423 views bookmark tags: sitelock (updated 928 days ago)


Was this resource helpful?

Did this resolve your issue?


Please add any other comments or suggestions about this content:





Recommended Help Content

This article will explain the benefits of SiteLock for small businesses. (updated 928 days ago)
Knowledgebase Article 16,616 views tags: sitelock

This article will explain how and when to contact SiteLock for support. (updated 790 days ago)
Knowledgebase Article 16,361 views tags: security sitelock

This article will explain how to order SiteLock (updated 257 days ago)
Knowledgebase Article 14,364 views tags: security sitelock

Related Help Content

This article will explain the benefits of SiteLock in regards to application scanning. (updated 928 days ago)
Knowledgebase Article 7,122 views tags: sitelock

This article will explain the process of verifying a domain and account information for a SiteLock account. (updated 95 days ago)
Knowledgebase Article 41,375 views tags: security sitelock

This article will explain the benefits of SiteLock in regards to SQL injections. (updated 100 days ago)
Knowledgebase Article 8,926 views tags: sitelock

This article will explain the benefits of SiteLock in regards to virus scanning. (updated 102 days ago)
Knowledgebase Article 2,999 views tags: sitelock

This article will explain the benefits of SiteLock in regards to reputation monitoring. (updated 929 days ago)
Knowledgebase Article 2,635 views tags: sitelock

This article will explain the benefits of SiteLock in regards to cross-site scripting (XSS). (updated 928 days ago)
Knowledgebase Article 13,108 views tags: sitelock

This article will explain what to do when SiteLock finds a vulnerability. (updated 441 days ago)
Knowledgebase Article 7,116 views tags: sitelock

This article will explain how to install the SiteLock Trust Seal. (updated 928 days ago)
Knowledgebase Article 45,925 views tags: sitelock