Jump to content

Back End security issues with Websites and Email Servers


marge_rohr

Recommended Posts

Talking about websites and blog sites; I don’t know what questions to ask when talking about the “back end” of any site your going to use. For example, GoDaddy is where my domain name is. What can they access of my private emails and let’s say website if directed there? Same as, let’s say WordPress or others? You are loading up your info on their platform right? So is anyone else concerned about the access they may have to you and your clients communications and information? I have already had someone use one of my images that was not authorized. Makes me think about more possibilities?? Any thoughts?
Link to comment
Share on other sites

Organisations liks GoDaddy allow you to register (multiple) multiple domain names and 'host' (multiple) websites and e-mail addresses.

 

IMHO, it's not 'improper access' by your website provider you need to worry about. Providers like GoDaddy host many millions of websites and e-mail accounts.Yes, some employees can access your account and the back-end of your website. They need this access to respond to any 'support requests' you may submit. But they have no other reason to do so.

 

The 'security' provided by hosting companies against unauthorized access by others (hackers) is more important. As is the level of security provided by the 'web platform' you choose.

 

These days, so-called (all-in-one) 'website builders' are popular and easy to use. GoDaddy has one too. Other examples are Wix, Wordpress.com, Squarespace, Weebly, etc. To build your website you simply choose a theme and the.optioms they provide.

 

GoDaddy also provides tradional 'hosting' services whereby they (for example) set up an initial but 'empty' Wordpress website for you that you can then build on using the Wordpress website configuration options. That often requires you to keep your Wordpress website up to date.

 

On some professional photographers' websites they only provide smallish versions of their portfolio.

  • Like 1
Link to comment
Share on other sites

Organisations liks GoDaddy allow you to register (multiple) multiple domain names and 'host' (multiple) websites and e-mail addresses.

 

IMHO, it's not 'improper access' by your website provider you need to worry about. Providers like GoDaddy host many millions of websites and e-mail accounts.Yes, some employees can access your account and the back-end of your website. They need this access to respond to any 'support requests' you may submit. But they have no other reason to do so.

 

The 'security' provided by hosting companies against unauthorized access by others (hackers) is more important. As is the level of security provided by the 'web platform' you choose.

 

These days, so-called (all-in-one) 'website builders' are popular and easy to use. GoDaddy has one too. Other examples are Wix, Wordpress.com, Squarespace, Weebly, etc. To build your website you simply choose a theme and the.optioms they provide.

 

GoDaddy also provides tradional 'hosting' services whereby they (for example) set up an initial but 'empty' Wordpress website for you that you can then build on using the Wordpress website configuration options. That often requires you to keep your Wordpress website up to date.

 

On some professional photographers' websites they only provide smallish versions of their portfolio.

 

Thank You this is great information and insight!

  • Like 1
Link to comment
Share on other sites

As the unibomber, the NSA, and others have known, if you're connected, you are vulnerable.

 

as my daughter said some 20 years ago, "Oh Dad, privacy is so 20th century"

 

As the water rises around your ankles, this may not be your major concern:(

Edited by JDMvW
  • Like 4
Link to comment
Share on other sites

  • 3 weeks later...
Not sure what you mean by Back End in this situation ? In computer jargon, "back-end" usually means the database layer where all of your data is loaded and stored. This is the most secure layer in a web based application. All of your personal data for example your name, phone number, address, credit card information etc. as well as blogs, tweets, comments, pictures, whatever is stored there. The next layer is the Aplication layer. This is where the code meaning apps/programs are stored that access and manipulate the data stored on the back end, or database. Finally there is the Presentation Layer which is the graphical display that appears on your computer screen. The presentation layer is the most vulnerable because it usually works in conjunction with a Browser, which means any hacker could break into the browser and manipulate the data before or after it reaches your computer screen. Unless you are a Master Hacker, it is very difficult to break into a back end because it is not linked to the internet. The only way would be to know the passwords used to acess the data base.
  • Like 1
Link to comment
Share on other sites

Not sure what you mean by Back End in this situation ? In computer jargon, "back-end" usually means the database layer where all of your data is loaded and stored. This is the most secure layer in a web based application. All of your personal data for example your name, phone number, address, credit card information etc. as well as blogs, tweets, comments, pictures, whatever is stored there. The next layer is the Aplication layer. This is where the code meaning apps/programs are stored that access and manipulate the data stored on the back end, or database. Finally there is the Presentation Layer which is the graphical display that appears on your computer screen. The presentation layer is the most vulnerable because it usually works in conjunction with a Browser, which means any hacker could break into the browser and manipulate the data before or after it reaches your computer screen. Unless you are a Master Hacker, it is very difficult to break into a back end because it is not linked to the internet. The only way would be to know the passwords used to acess the data base.

I will process this! Thank you for your time articulating all of this info!

Marge

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...