Certificate Authorities Say Goodbye to 2-Year SSL Certificates

As of September 1st, 2-year certificates have been replaced by multi-year SSL Certificate plans. The only certificates that will be trusted by major browsers will be those with a validity period of 397 days or less. Why 397 days? That’s one year plus a one-month grace period for renewal. Users will have to do a […]

As of September 1st, 2-year certificates have been replaced by multi-year SSL Certificate plans. The only certificates that will be trusted by major browsers will be those with a validity period of 397 days or less. Why 397 days? That’s one year plus a one-month grace period for renewal.

Users will have to do a little bit extra on their end as the switchover is being made, but the trade-off is a higher level of security over the long-term.

Why Has This Happened?

Shorter Validity = Higher Security

The goal of this change is to improve security for the Internet users (organizations and consumers); the shorter the validity period of a certificate, the more secure it is.

Among advantages that come with shorter-term certificates, the following four are key and worth highlighting them:

  • A shorter lifespan for keys, which means a shorter lifespan for compromised keys, as well. With shorter certificates, you have a smaller window of exposure if a key is stolen.
  • Certificate security updates are rolled out into the wild at a much quicker pace.
  • Organizational information is updated on a yearly basis, including company names, addresses, and domains, which translates to increased user trust.
  • Automation is encouraged. With a good certificate management system in place, there is no difference in convenience between shorter and longer lifetimes. They are automatically re-issued when needed, regardless of the validity period.

How Does This Affect My Website?

This change affects only the public TLS certificates. Root Certificates as well as Code Signing Certificates (CSC), S/MIME, Document Signing Certificates (DSC), etc) are not impacted.

The main thing for Webmasters to consider regarding this change is that they will have to “worry” only about more frequent certificate expiration dates. Subsequently, webmasters and IT companies that handle SSL certificates for their end-clients must put in place proper certificate management procedures.

What Happens With Certificates Issued before 1st of September 2020?

Those Certificates issued before the 1st of September 2020 will remain valid as per their original validity period. The only time you’ll notice anything different is if they need to be re-issued. In that case, you won’t lose any of the validity time, but you’ll need to plan to re-issue again if your initial validity period is still greater than 397 days.

How Come NetShop ISP Still Offers 2-Year SSL Subscriptions?

As the SSL Certificates are under the SPP (Self-provisioned Products) umbrella, we do have the appropriate certificate management procedures to allow 2-Year Subscriptions on all the SSL Certificates. This is fully inline with the CAs; we are offering the 2-Year Subscription so you can do Costs Savings, whilst we are taking care for your SSL Certificate’s Renewal Notification on the 1-Year Due Date.

Contact our SSL Specialists for additional consulting or to sort out any questions you may have related to the SSL Validity Period Change. All our SSL Certificates with a Discounted 2-Year Subscription length can be directly purchased via https://my.netshop-isp.com.cy/cart/ssl-certificates/

One Simple Step to Add Disaster Recovery to your Cloud Services

A cloud backup solution protects your company’s data so you can always restore your critical business systems. However, in case of a serious outage like one caused by fire, your backup files will be safe – but it will take days or even weeks to bring the applications back online. When it comes to critical […]

A cloud backup solution protects your company’s data so you can always restore your critical business systems. However, in case of a serious outage like one caused by fire, your backup files will be safe – but it will take days or even weeks to bring the applications back online. When it comes to critical business systems and customer-facing services, each hour of downtime costs money and jeopardizes your reputation. In fact, a single unplanned downtime can cost a Small-to-Medium Business (SMB) an average of €69,346 to €215,968, according to the IDC.

Disaster Recovery as a Service (DRaaS) minimizes recovery time by quickly spinning up the systems in a cloud datacenter. That means in case of a serious outage, you can count on getting back to business quickly.

 Cloud BackupDisaster Recovery
Key FunctionProtect data from lossRecover Applications quickly after a Disaster
Application Recovery TimeHours to DaysMinutes
Storage TypeCold StorageHot Storage

DRaaS with NetShop ISP

NetShop ISP’s DRaaS is an easy and affordable DRaaS solution, built on top of our Cloud Backup Solution, that protects critical corporate workloads by instantly spinning up IT systems in the managed cloud recovery site and recovering them to any similar or dissimilar hardware.

Zero Capital Investment (CapEx)
Protect your budget with no investments in an off-site DR facility, or in on-premises software and hardware.

Managed cloud recovery site
Leverage the full cloud infrastructure with the ability to failover to and run machines in the cloud.

Easy, intuitive solution
Enjoy a self-service web-based console for key operations like disaster recovery testing, failover, and failback.

Enable disaster recovery with a few clicks
Add and configure a cloud-based recovery server with just a few clicks using the intuitive web console.

Disaster recovery for any workload
Support all popular workloads – Windows and Linux, major hypervisors, and business applications.

What’s Included

  • Secure off-site Recovery Infrastructure
  • Failover to the Cloud Recovery Site
  • Disaster Recovery Orchestration
  • Fallback to Primary Site or to a new Location of your choice
  • Instant Recovery of machines in a local, virtualized infrastructure
  • Recovery to dissimilar hardware, including bare-metal, physical, virtual or cloud environments
  • Non-disruptive failover testing to the Cloud
  • Protection of data on 20+ Platforms, incvluding virtual, physical, and cloud-based servers
  • Full image and file-level backups
  • Wire range of Recovery options: entire machine, ESXi Configuration, single files and folders, databases, Office365, GSuite, etc
  • Proactive anti-ransomware protection for Windows machines

Support Environments for Disaster Recovery

  • Physical and Virtual Machines
    • Windows
    • Linux
  • Virtualization Platforms
    • VMWare VSphere
    • Microsoft Hyper-V
    • Linux KVM
    • Citrix XenServer

Existing Customers signed up for any of NetShop ISP’s Cloud Backup Plans can add Disaster Recovery for the backed up machines & files in one simple click through our intuitive Cloud Backup panel.

Our Certified Team of Cyber Protection Specialists are always looking for new challenges and ways to help your Offline or Online business from recovering a Disaster, or ensuring that your business has taken all necessary measures (preventive) to allow a Disaster Recovery Scenario to be conducted successfully.

Contact us today via e-mail at sales@netshop-isp.com.cy or on Skype (netshopisp) for a free consultation.

How to Upgrade CentOS 7 to CentOS 8

How to Easily Upgrade your Server from Linux CentOS 7 to CentOS 8

Updated on January 21, 2021

In this article, you will learn how to upgrade your Linux dedicated or virtual server from CentOS 7 to CentOS 8.

Step 1: Install the EPEL Repository

# yum install epel-release -y

Step 2: Install yum-utils Tools

# yum install yum-utils

After the above step, you now need to resolve the RPM packages by executing the commands:

# yum install rpmconf
# rpmconf -a

Next, perform a clean up of all the packages you don’t require with the following commands:

# package-cleanup --leaves
# package-cleanup --orphans

Step 3: Install the dnf in CentOS 7

DNF is the default package manager in CentOS 8. Install it by executing the following command:

# yum install dnf 

Now remove the yum package manager:

# dnf -y remove yum yum-metadata-parser
# rm -Rf /etc/yum

Step 4: Upgrade CentOS 7 to CentOS 8

First upgrade the dnf package manager:

# dnf upgrade

Next, install CentOS 8 release package using dnf as shown below. This will take a while.

# dnf install http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-repos-8.2-2.2004.0.1.el8.x86_64.rpm http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-release-8.2-2.2004.0.1.el8.x86_64.rpm http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-gpg-keys-8.2-2.2004.0.1.el8.noarch.rpm

Next, upgrade the EPEL repository as follows:

# dnf -y upgrade https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm

Now, remove all the temporary files by executing the following command:

# dnf clean all

Remove the old CentOS 7 kernel core

# rpm -e `rpm -q kernel`

Then you need to remove all conflicting packages:

# rpm -e --nodeps sysvinit-tools

Thereafter, launch the CentOS 8 system upgrade as shown below:

# dnf -y --releasever=8 --allowerasing --setopt=deltarpm=false distro-sync

Step 5: Install the New Kernel Core for CentOS 8

# dnf -y install kernel-core

You are now ready to install CentOS 8 minimal package:

# dnf -y groupupdate "Core" "Minimal Install"

The CentOS 7 to CentOS 8 upgrade task has been completed! You may issue the following command to verify:

# cat /etc/redhat-release

If you are a NetShop ISP Fully Managed Hosting Customer, you may simply drop an email to the Support team to upgrade your CentOS 7 server to CentOS 8. Alternatively, should you wish to perform the upgrade on your own feel free to use this article with the steps described above.

The procedure has been tested at NS Labs for the purposes of drafting this Linux tutorial.

How to Order a Cheap Linux CentOS Server

You can deploy your next Linux CentOS Server in 60 seconds by choosing any of our VPS Hosting plans in Cyprus, Malta, UK, Amsterdam (Netherlands), Los Angeles (United States) and Singapore.

If you prefer dedicated resources then we strongly recommend that you order a cheap dedicated server, at the location of your preference from this page.

Scanning for Malware without affecting your Machine’s Real-time activities and Performance

Malware infects backups quite often. Some companies can scan backups in a centralized location but it takes a lot of time to perform consecutive regular scans. Active malware can also infect unpatched disk images all over again. Daily or evenweekly full disk on-demand scans take a lot of time and often can’t be done in […]

Malware infects backups quite often. Some companies can scan backups in a centralized location but it takes a lot of time to perform consecutive regular scans. Active malware can also infect unpatched disk images all over again. Daily or even
weekly full disk on-demand scans take a lot of time and often can’t be done in non-working time, meaning employees are constantly disturbed by scans and can lose productivity.

A typical systems administrator has to deal with a lot of machines and their corresponding backups. As part of that work, they need to deal with all of the issues mentioned above and be prepared for other challenges. For example, backed up system drives aren’t the only components susceptible to malware. A device’s OS and third-party apps can also become gateways of infection.

Backup and anti-malware are two essential parts of a modern endpoint security posture. While scanning for malware is usually performed before doing a backup, there are many cases when malware makes its way into backup images. This can happen because of the limited detection capabilities of an average anti-malware solution or because a backup was done before the anti-malware scan.

Full scans of large archives (including backups) to detect malware require considerable time and computational resources. As a result, they’re often not an efficient use of time and resources. That said, scanning archives becomes especially critical if the archives are not stored locally, but in cloud storage, because the speed of access to an archive in the cloud may be significantly slower than accessing a local storage device (depending on the speed of the network or communication channel being used, and/or how heavily-loaded the channel is). Additionally, if any viruses and/or malicious files are found in the archive, the archive is considered damaged or infected, and may not be suitable for use in a system recovery or for file and data extraction.

Historically, to avoid restoring data that’s infected, archives were periodically scanned with anti-virus scanners during storage, when new slices are added to the archive, and/or before restoring the data. However, today there is no solution that allows for custom archive scans in terms of timing or scope. Instead, solutions are forced to scan the entire archive. Furthermore, damaged or infected data in archives cannot be repaired.

Patching machines and applying the latest anti-malware definitions allows sysadmins to restore an OS image that’s ready to withstand a reoccurring infection. To scan backups for malware effectively and properly in a centralized location is another necessary step to ensure safe restores and safe data storage. This is what NetShop’s Cyber Protect solution (powered by Acronis) provides.

Through Acronis Cyber Protect, users can scan full disk backups at a centralized location (Acronis Cloud or onpremises server with the ability to expand support for Amazon, Google, Microsoft, or any other popular cloud storage environment in the future) to find potential vulnerabilities and malware infections, thus ensuring a malware-free backup for a malware-free restore, should it become necessary.

It is now possible to inspect not only one big backup but also archived slices for malware. We can mount the first slice of a plurality of slices in a backup archive to a disk, wherein the first slice is an image of user data for the first time. Acronis technology can detect a modified block of the mounted slice, identify files in the mounted first slice that correspond to the detected modified block, and scan specific files for viruses and other malicious software. This approach also allows Acronis to generate a cured slice that comprises the user data of the mounted first slice without the inclusion of malicious files. By scanning in centralized locations, Acronis Cyber Protect allows users to:

  • Reduce loads on client endpoints
  • Restore only clean data
  • Increase the potential of rootkit and bootkit detections (which are not easily detected during the first on-access or on-demand scans)
TIP: Do quick scans of endpoints and the remaining scan in the centralized location after backup. This ensures you don’t need to compromise between performance and security with Acronis Cyber Protect.

Contact our Cyber Security Specialists today for a free consultation and instant access to your Cyber Protect account.

NetShop ISP announced as an Official Supporter of the Safer Gambling Week 2020 (Cyprus)

The National Betting Authority is organising for the 3rd consecutive year the Safer Gambling Week (SGW) which will be held from the 5th until the 11th of October 2020. The SGW aims to inform the public and raise awareness, as well as involve and mobilise all stakeholders regarding safer gambling and protection of wider society from any harmful […]

The National Betting Authority is organising for the 3rd consecutive year the Safer Gambling Week (SGW) which will be held from the 5th until the 11th of October 2020. The SGW aims to inform the public and raise awareness, as well as involve and mobilise all stakeholders regarding safer gambling and protection of wider society from any harmful consequences of gambling activities.

NetShop Internet Services, a two-time Award winning iGaming Hosting Provider, has been announced as an Official Support of this year’s SWG Conference in Cyprus.

The launch of the week will be marked by the 3rd Safer Gambling Conference. During the week, there will be various activities and events such as workshops, interactive games, presentations, training seminars, and more in all districts in the Republic.

The SGW’s objective is to inform the public on safer gambling practices, self-protection measures that players can set for themselves, as well as treatment centres and facilities for gambling disorder. The week aims to communicate that gambling should remain a fun activity for those who decide to participate in any gambling activities.

The ultimate goal of the Safer Gambling Week is to become a platform for discussion and constructive dialogue between various stakeholders of the Cypriot society and the gambling industry regarding safer gambling practices, and eventually become a cross-industry and community wide institution where it will get people talking about safer gambling: gambling venues staff, players, family, friends, wider community.

The theme for the 3rd Safer Gambling Week is “Let’s keep it a game”. Safe participation in gambling implies that the person who decides to gamble, will do so without putting in risk himself or those around him.

The agenda for the SGW 2020 will be announced soon and will be updated frequently. More information on the week and its activities can be found at www.sgw.cy

This year, taking into consideration international best practices and the suggestions of the scientific community, the Authority has decided to proceed with the rebranding of Responsible Gaming to Safer Gambling. The focus on safer gambling promotes a new understanding of the responsibility of the state and gambling operators and providers to enhance player’s protection mechanisms. The idea of “Responsible Gaming” suggests that the players is primarily responsible for protecting himself. This prevailing view, although correct, should be revised and used in a broader sense. The notion of “Safer Gambling” emphasizes that in addition to individual responsibility, there is a clear responsibility of the state and its institutions, as well as gambling operators and all stakeholders involved.

More information on safer gambling can be found at the website www.safergambling.gov.cy

The Authority informs the public that, all the activities of the Week will be carried out in accordance with the directives and the decrees of the Minister of Finance for containing the spread of the COVID-19 Coronavirus disease.

Six Costly Microsoft Office 365 Data Protection Gaps

To prevent data loss, ensure business continuity and avoid compliance penalties, you need to be aware that Microsoft does not include formal data protection for Office 365, so there might be gaps in your expectations and the reality.

For over 500,000 businesses worldwide, it’s hard to imagine business as usual without Microsoft Office 365 — anywhere, anytime access to applications means you can work non-stop. That is until you can’t.

Working without Office 365 today is a huge hurdle for users – so recovering that data quickly is essential to keep businesses running. The challenge is, Microsoft promises reliable access to its applications but not true backup. This means managers are responsible for defending their organization’s O365 data from loss.

Users often forget that in the cloud you are renting a service from providers, which means you agreed to their terms. In the case of Microsoft, the company commits to ensuring the building doesn’t fall down and the lights stay on — or delivering high performance, access and uptime for Office 365 applications.

But Microsoft does not take responsibility for what’s inside Office 365 — your data.

To prevent data loss, ensure business continuity and avoid compliance penalties, you need to be aware that Microsoft does not include formal data protection for Office 365, so there might be gaps in your expectations and the reality.

Here are 6 Common Data Threats Office 365 business customers can face:

1. Accidental Deletion Issues

With Microsoft Office 365, administrators and employees alike routinely delete Exchange Online emails, attachments and files, Office 365 user profiles, OneDrive for Business files, and SharePoint Online content. Should an item need to be recovered, the age of the resource may render that impossible: Older data may be hard-deleted and unrecoverable while more recent deletions of newer resources may be found in the Recycle Bin or Recoverable Items folder.

Fact: 29% of data loss is due to human error

Source: CSO

2. Retention Policy Issues

It’s up to customers to manage retention policies, which can be time consuming and error-prone: You may think you’ve set the right parameters to retain data, but changing or misaligned priorities in Office 365 data retention policies can result in data being hard-deleted. Be aware, if for whatever reason a hard-deletion occurs due to aging out of the existing retention policy, Microsoft has no ability to recover the deleted resource.

Fact: 80% of Companies have lost data in the Cloud due to Retention Policy Issues

Source: Osterman Research

3. Internal Security Threats

Microsoft Office 365 resources also require protection from malicious alteration or data destruction by disgruntled employees, contractors or partners. Microsoft does not guard against these foes — it has no way of knowing if deletion was accidental, malicious or intentional.

Fact: 90% of Organizations are vulnerable to insider threats

Source: Insider Threat Report

4. External Security Threats

Microsoft has only limited protections against malware attacks like ransomware (which encrypts user data and holds it hostage until an online ransom is paid) and a limited ability to restore malware-encrypted or -altered files. That means Microsoft Office 365 data is vulnerable to destruction or alteration by a variety of threats mounted by hackers, cybercriminals or hostile state actors.

Fact: $20 billion in global ransomware damages are projected by 2021

Source: Cyber Security Ventures

5. Migration from On-premise to Cloud

Microsoft does not address data loss issues during premises-based Microsoft Office to cloud-based Office 365 migration. The two backup solutions are often incompatible, making it impossible to restore legacy data into the new environment. Meanwhile, few third-party data protection solutions integrate backup functionality for Office and Office 365: they usually protect one or the other, but not both.

Fact: 75% of CXOs say that managing privacy and data protection regulations in the cloud is complex

Source: CXO Today

6. Legal and Compliance Issues

Compliance requirements (e.g. GDPR, HIPPA) and legal issues can exacerbate costs related to any data loss incident. Without timely access to data, businesses are exposed to government or industry-specific regulatory fines, legal penalties, revenue and stock price hits, plus damage to company brand and customer trust.

Fact: $57 million is the largest GDPR penalty issued to date (Google)

Source: Fortune.com

The reality is that emails, attachments, and shared files stored in Office 365 are not protected from the most common and serious data loss issues, ranging from simple accidental deletions to sophisticated malware attacks. This means that Office 365 data loss is an unhappy surprise waiting to happen — with incredibly high stakes. Failure to defend Office 365 data can be career-limiting.

To learn more about securing your Office365 data with an easy-to-use, agentless and reliable cloud backup visit our Acronis Cloud Backup plans or contact one of our Cloud Backup Specialists at sales@netshop-isp.com.cy

NetShop ISP is expanding its SSL Certificates Portfolio with REST API Enabled

[Larnaca, Cyprus – Sep 10th, 2020] – NetShop ISP announces the expansion of SSL certificates offered to End-users and its Resellers to include the World’s most reputable brands such as Symantec, Thawte, GeoTrust, RapidSSL, Certum, and Comodo. NetShop Internet Services has managed to seal the best prices from all brands so customers can buy the […]

[Larnaca, Cyprus – Sep 10th, 2020] – NetShop ISP announces the expansion of SSL certificates offered to End-users and its Resellers to include the World’s most reputable brands such as Symantec, Thawte, GeoTrust, RapidSSL, Certum, and Comodo. NetShop Internet Services has managed to seal the best prices from all brands so customers can buy the certificates at lower rates than buying direct. The SSL offerings include Extended Validation (EV), Organization Validated (OV), and Domain Validation (DV) certificates, along with Multi Domain, Wildcard, Code Signing, and Unified Communication Certificates (UCC).

Moreover, Resellers can take advantage of a powerful REST API to integrate all SSL Certificate brands into their own store/portal with very competitive prices.

“We pay great attention to what our Customers and Partners require and we are flexible enough to provide them with the products, services and bespoke solutions at a timely manner and an affordable pricing,” said Katerina Burtsava, Head of Business Development at NetShop ISP.

By adding SSL certificates to their portfolio, NetShop Internet Services aims to help their customers increase their trust online, as well as providing a more secure web experience for their users. SSL certificates are digital security protocols that encrypt important information sent from a browser to a server, like credit card numbers, usernames, passwords, and more.

More information: https://netshop-isp.com.cy/en/addons/ssl-certificates

About NetShop ISP
NetShop Internet Services Ltd is a Cyprus incorporated company established in 2004 offering Web Hosting & Data Center Services via Privately-owned Datacenter Infrastructure in Cyprus, Malta, United Kingdom and Los Angeles.

Contact Person: Katerina Burtsava
Direct Sales: sales@netshop-isp.com.cy
Partnership Inquiries: partners@netshop-isp.com.cy
By Phone:
+357-2425-0808 (Cyprus and International)
+356-277-80777 (Malta)
+44-203-5198334 (United Kingdom)
+1-888-4646943 (United States)
+7-499-3715327 (Russia & CIS Region)

Why Use a Virtual Private Server (VPS) when Trading Forex

What is a VPS? VPS stands for Virtual Private Server. A VPS uses virtualization technology to “split” one physical hardware server into multiple virtual servers. The word ‘private’ implies that each Virtual server has its own resources so you won’t have to share RAM and CPU with other users. Additionally, since each VPS is a […]

What is a VPS?

VPS stands for Virtual Private Server. A VPS uses virtualization technology to “split” one physical hardware server into multiple virtual servers. The word ‘private’ implies that each Virtual server has its own resources so you won’t have to share RAM and CPU with other users. Additionally, since each VPS is a different layer on the physical server it can have its own Operating System and host data in non-shared hard disk sectors which enhance the VPS’ performance & the user’s data security.

Why Do I Need VPS to Trade Forex?

Among various benefits that a VPS offers to a user, we have summarized the 3 most important reasons to use it when trading forex:

  1. To ensure your MT4/MT5 terminal stays online. It reduces the risk of loss due to power outages of your personal computer/laptop or internet disconnections. A 24/7 uptime of your Forex trading platform is crucial especially if you are trading using a robot or Expert Advisors (EA).
  2. Faster trade execution. By using a VPS in the same (or as near as possible) location as your Forex broker, you are able to open and close trades much faster than would otherwise be possible. In order to make the best choice when choosing a VPS provider we recommend that you ask for Ping/Latency results. Based on the results choose the provider with the lowest possible latency.
  3. Fully Managed Forex VPS Hosting. We understand that you, as a Forex Trading hobbyist or professional, might not be a technical expert to maintain any Operating System Updates or troubleshoot issues as may arise. Search for VPS Hosting companies that offer Managed VPS so they can help you with any aspects of your VPS environment.
What are the VPS specifications I will need?

VPS Servers that are used for Forex Trading will have Windows Operating System. In most VPS providers you will be asked to choose among Windows Server 2012 R2, Windows Server 2016 or latest. Any of these are good to be chosen.

In terms of the hardware resources, the minimum requirements you should seek to properly run your Trading terminal are:

1GB RAM
1 vCPU
40GB Hard Disk
1 Public Dedicated IP
No Antivirus, No Firewall (unless you are an experienced user)

The above specs can be altered/upgraded depending on the number of trading terminals you wish to run simultaneously.

NetShop ISP maintains multiple Datacenters locations near the world’s most popular Forex brokers in order to keep the lowest possible latency with all our Forex VPS servers. Contact one of our Forex Specialists for a FREE Consultation regarding your Forex VPS needs. Alternatively you may browse our VPS plans get started instantly.

Backup vs Disaster Recovery: 4 Steps in Making the Right Assessment

In data protection, recognizing when a data loss event is a minor blip versus a major catastrophe adds tremendous value to your business – determining the action taken and the impact to their bottom line. Sometimes accessing a secure backup is sufficient. Other times critical data must be instantaneously recovered. Since time is money, knowing […]

In data protection, recognizing when a data loss event is a minor blip versus a major catastrophe adds tremendous value to your business – determining the action taken and the impact to their bottom line. Sometimes accessing a secure backup is sufficient. Other times critical data must be instantaneously recovered. Since time is money, knowing which technique to use in a given circumstance is critical and separates superior service providers apart from the competition.

Here are four steps needed to determine whether your business model requires backup or disaster recovery services:

1. Understand the Basics about Data Protection Tools

Cloud backup – Protects critical data off-site so business files, applications and systems are safe
and accessible – and can always be restored. View Cloud backup plans.

Cloud disaster recovery – Recovers critical data quickly and remotely whenever any serious outage risks a company’s reputation and bottom line.

Disaster recovery as a service (DRaaS) – Delivers instant recovery services by running systems in an off-site data center. Businesses can operate remotely while normal processes are restored. Use-cases include local data loss due to human error, software and hardware failures, malware attacks, and natural disasters.

2. Evaluate critical data needs and pain points

While businesses need thorough, complete backup of all data (e.g. mobile, laptops, servers), disaster recovery is focused on data and systems that businesses need to stay in business. This may be the online cashier system for a retailer. For a firm or hospital, client/patient records may be most essential. Identifying what data matters most will help you and your customers understand the cost of downtime and plan recovery accordingly.

3. Get your Calculator out

Budget reports provide needed information to evaluate costs like infrastructure expenses (from staff to IT hardware) as well as revenuegenerating channels. Companies need to run the numbers to establish the basic requirements they have to keep running. This information clarifies two key pieces of information: the
Recovery Time Objective (RTO) and the Recovery Point Objective (RPO).

RTO – The absolute maximum amount of time a business can be down after a failure or disaster occurs to avoid unacceptable consequences.

RPO – Determines how often backups must be made in order to recover an acceptable quality of data within the RTO.

4. Exercise Judment to Plan Recovery

The financial cost of downtime becomes self evident, but these numbers still need to be weighed against the risk of intangible losses, like reputation damage. For example, for an online retailer that’s built its brand on efficient customer service, any downtime can be disastrous. A landscaping business can likely tolerate more downtime before it affects customers, so the restore priorities would be different. Knowing your customer’s specific requirements means you can establish a plan that brings back the heart of their operation first, and so forth. Businesses must spend more to recover quickly, so prioritizing your data protection needs along with the establishment of your Budget from Step 3, is crucial to the execution of a successful Disaster Recovery and Backup Protection plan.

Talk with one of our Business Continuity Specialists today for a Free Consultation. Additionally, you may review our Acronis Backup Plans and Sign up instantly.

Never lose GSuite data with NetShop’s worry-free backup solution

Never lose G Suite data and ensure quick recovery with a worry-free, cloud-to-cloud solution. Since Google does not take responsibility for protecting customer G Suite data from loss – as in the case of accidental or intentional data deletion, malicious actions, or ransomware – a separate backup and recovery solution is needed. With cloud-to-cloud G […]


Never lose G Suite data and ensure quick recovery with a worry-free, cloud-to-cloud solution.

Since Google does not take responsibility for protecting customer G Suite data from loss – as in the case of accidental or intentional data deletion, malicious actions, or ransomware – a separate backup and recovery solution is needed. With cloud-to-cloud G Suite data backup with Acronis Cyber Backup Cloud, you can recover certain items quickly and reliably and eliminate complexity related to setting up and maintaining the solution.

WHY DO WE NEED GSUITE BACKUP?

Google has a great reputation for keeping G Suite systems up and available for customers. But like many SaaS solutions, it does not take responsibility for keeping customer data safe – it does not offer true backup and recovery functionalities.

There are many reasons why companies lose their G Suite data. The top reasons include:

• Accidental data deletion
• Malicious actions
• Malware and ransomware.

So while Google ensures infrastructure resilience, data protection remains the customer’s responsibility. This means businesses require a backup solution to avoid downtime and unrecoverable data loss.

By signing up with any of NetShop ISP’s Cloud Backup Plans (https://netshop-isp.com.cy/en/addons/cloud-backup) you benefit from the following features:

  • Protection for Gmail, Drive, Calendar and Contacts
  • Reliable point-in-time recovery of single items and entire Drive or Gmail data
  • Quick Recovery of needed items with GSuite Backups full-text search
  • Authenticity Verification of files in Drive backups with blockchain
  • Backup Health monitoring and reporting of your GSuite Backup Operations

Learn more about our various Cloud Backup Plans starting from €7.5/month at https://netshop-isp.com.cy/en/addons/cloud-backup or drop us an email to speak with a Cloud Backup Specialist.Toggle panel: Yoast SEO Premium

Why Do We Still Need Data Centers in 2021? Facts Revealed Here!

Understanding the roles and functions of a business IT infrastructure is a must. Why? It is through establishing this infrastructure that your business data and information can properly be taken good care of. That is why you need data centers because they are used to make sure that there is continuity of the IT infrastructure of your business.

Updated on 26 May, 2021

Understanding the roles and functions of a business IT infrastructure is a must. Why? It is through establishing this infrastructure that your business data and information can properly be taken good care of. That is why you need data centers because they are used to make sure that there is continuity of the IT infrastructure of your business.

Most businesses these days, small or big, are contracting data centers. They are doing this because they believe in their tested servers to perform even if there is a power outage in one locality. They have backup generators for electricity production purposes. They need backup generators because their operation should not stop. 

A normally functioning data center should offer 100% Uptime SLAs, UPS and Generators. These are the important aspects to protect the data even during the time of an inevitable outage. They also have backups for Internet trouble. They have 24/7 technical support that purposely functions to give a controlled access to its clientele. They are well trained in providing a tight security, monitoring services, and surveillance services round the clock.

Data Centers Protect Your Business Data

Today, computer hardware is constantly evolving. From the larger versions in the past to getting so smaller at present. In terms of efficiency, capacity and speed, today’s hardware is more efficient, more powerful and faster. However, the processing power of a particular computer hardware inside your office is not enough to cater to the needs of your clients when it comes to storing and managing bulky files and information. Therefore, there should be a strategy to manage information and data properly. And this is where data centers play their important role and functions for all business organizations globally. 

To some extent, the data being processed daily by a medium sized business entity are voluminous. The specific business groups that need a data center may include but not limited to telecommunication companies, educational bodies, financial groups, retailing businesses, and any other data-driven business forms. Ensuring customer satisfaction is the bottom line why these businesses need the support of a data center. 

It is quite necessary to note that even big companies like Amazon, Google and Facebook are relying on data centers. Why? Because of the fact that without a data center, their data can’t be stored, processed, and managed effectively, efficiently.  But most of those big companies have established cloud-based data center services. They put up virtual servers with backups and they build a more sophisticated data infrastructure.

Those small and medium sized companies are relying on other types of information centers such as Colocation and Enterprise Data Centers. A colocation data center is operating a facility that a company can rent. There is an exclusive space for the computing hardware and servers. It further provides a particular physical space, cooling system, power source, as well as physical and bandwidth security. Then, the customer is typically obliged to provide storage and servers.

Moreover, an enterprise data center has a number of data centers. Each of those centers has a task to sustain some important functions and roles. There are mainly three classifications under this type of a data center: Extranet, Intranet, and Internet.

Data Centers Enhance the Reliability of your Infrastructure

Way back in 2011, there was study conducted by International Data Corporation that said that there were 1.8 zettabytes (ZB) or 1.8 trillion gigabytes (GB) being produced that year. Furthermore, such figure had increased in the succeeding year, 2012, as the data generated had reached to 2.8 ZB more or less. Then there has been a speculation that by 2020, the data are expected to reach 40 ZB.

The constant increase in data accumulation and production each year should trigger businesses all over the world to find the significance of an operational data center. May it be cloud-based or server-based, storing a data in a certain platform and managing the same can be a tricky and tedious thing to do. But with the expertise of the service providers, it can easily be done. In fact, it has been noted that centralized computing networks are the answer to the problems associated with voluminous data storage.

Know Your Data Center Provider

Regardless of the type of hosting you will acquire (shared web hosting, VPS, cloud instances, dedicated servers or colocation), a business owner should know in which Data center his business infrastructure and critical data will be hosted at.

For example, Acronis maintains data centers infrastructure around the world. While its default location for cloud backups is in the United Kingdom, users have the option to choose other locations as well depending on their primary data location. If you are using Acronis Cloud Backup through a Service Provider like NetShop ISP, then you have the opportunity to have your servers and data backed up in a Service Provider’s hosted infrastructure. In both cases, you have the right to ask in which data center your backup is pointing to.

For more information about NetShop ISP’s Data Centers around the world visit this page or contact our 24/7 Customer Service team via Live Chat, Skype and E-mail.

How to install WordPress on CentOS 7 with MariaDB 10, Nginx and PHP-FPM 7

Updated on March 03, 2021 WordPress is one of the most popular open source Content Management systems, powering almost one out of three (1/3) websites on the Internet today. It is based on PHP and MySQL and packs a ton of features that can be extended with free and premium plugins and themes. WordPress is the […]

Updated on March 03, 2021


WordPress is one of the most popular open source Content Management systems, powering almost one out of three (1/3) websites on the Internet today. It is based on PHP and MySQL and packs a ton of features that can be extended with free and premium plugins and themes. WordPress is the simplest way to create your online store, website, or blog.

This tutorial will help you to install WordPress on CentOS 7 with Nginx as a web server, MariaDB 10.3 and PHP-FPM 7.3. It is an easy and straight-forward process and you can have your website up and running in less than 10 minutes.

Prerequisites

  • You have a domain name pointed to your server public IP address. In this tutorial we will use example.com.
  • You have ssh access on your dedicated / vps server and logged in as a user with sudo privileges.

Before starting make sure you update and upgrade all OS libraries and packages:

  • sudo yum update
  • sudo yum upgrade

Install Maria DB 10.3

Adding the MariaDB YUM repository

  • vi /etc/yum.repos.d/MariaDB.repo
[mariadb]
 name = MariaDB
 baseurl = http://yum.mariadb.org/10.3/centos7-amd64
 gpgkey=https://yum.mariadb.org/RPM-GPG-KEY-MariaDB
 gpgcheck=1
  • yum update -y

Install MariaDB 10.3 on CentOS 7

  • yum install MariaDB-server MariaDB-client

Start & Enable MariaDB on CentOS 7

Once the installation is done, you can start and enable MariaDB to run on system boot by executing the commands below:

  • systemctl start mariadb
  • systemctl enable mariadb

Set MariaDB Root Password

  • mysql_secure_installation

The first prompt would be to set the root password. however, if you have set it above, just enter the password and proceed.

… In order to log into MariaDB to secure it, we'll need the current password for the root user. If you've just installed MariaDB, and you haven't set the root password yet, the password will be blank, so you should just press enter here. Enter current password for root (enter for none): OK, successfully used password, moving on… Setting the root password ensures that nobody can log into the MariaDB root user without the proper authorisation. You already have a root password set, so you can safely answer 'n'. Change the root password? [Y/n] n

Next, remove the database anonymous user.

By default, a MariaDB installation has an anonymous user, allowing anyone to log into MariaDB without having to have a user account created for them. This is intended only for testing, and to make the installation go a bit smoother. You should remove them before moving into a production environment. Remove anonymous users? [Y/n] y … Success!

Now, disable remote root login

Normally, root should only be allowed to connect from 'localhost'. This ensures that someone cannot guess at the root password from the network. Disallow root login remotely? [Y/n] … Success!

Next, remove test databases

By default, MariaDB comes with a database named 'test' that anyone can access. This is also intended only for testing, and should be removed before moving into a production environment. Remove test database and access to it? [Y/n] y - Dropping test database… … Success! - Removing privileges on test database… … Success!

Finally, reload the privileges tables to effect the changes.

Reloading the privilege tables will ensure that all changes made so far will take effect immediately. Reload privilege tables now? [Y/n] y … Success!

Now restart mariadb:

  • systemctl restart mariadb

You have successfully installed MariaDB 10.3 on CentOS 7 Server. Now lets proceed with the next steps.

Create WordPress Database and WordPress DB User

Login to the MySQL shell by executing the following command:

  • mysql -u root -p

Now create the database, user and grant user to database privileges by executing the following commands. We will use ‘wpdb’ as the database name in our example and ‘wpuser’ for the database username.

  • CREATE DATABASE wpdb CHARACTER SET utf8mb4 COLLATE utf8mb4_general_ci;
  • GRANT ALL ON wpdb.* TO 'wpuser'@'localhost' IDENTIFIED BY 'enter-strong-password-here';
  • FLUSH PRIVILEGES;
  • EXIT;

Install PHP 7.3

To install PHP and all required PHP extensions run the following commands:

  • yum install epel-release yum-utils
  • yum install http://rpms.remirepo.net/enterprise/remi-release-7.rpm
  • yum-config-manager --enable remi-php73
  • yum install php-cli php-fpm php-mysql php-json php-opcache php-mbstring php-xml php-gd php-curl

PHP FPM has now been installed and we will be using Nginx as a web server. By default PHP FPM will run as user apache on port 9000. We’ll change the user to nginx and switch from TCP socket to Unix socket. To do so open the /etc/php-fpm.d/www.conf file edit the lines mentioned below:

...
user = nginx
group = nginx
...
listen = /run/php-fpm/www.sock
...
listen.owner = nginx
listen.group = nginx

Then, make sure the /var/lib/php directory has the correct ownership using the following chown command:

  • sudo chown -R root:nginx /var/lib/php

Start & Enable PHP-FPM on CentOS 7

  • systemctl enable php-fpm
  • systemctl start php-fpm

Now, the WordPress Part…

Before downloading the WordPress archive, you should create a directory in which we will place the WordPress files:

  • sudo mkdir -p /var/www/html/example.com

The next step is to download the latest version of WordPress from the WordPress download page using the following wget command :

  • cd /tmp
  • wget https://wordpress.org/latest.tar.gz

Once the wordpress archive file downloading completes, decompress the downloaded file and move the files into the directory you have created from the previous step:

  • tar xf latest.tar.gz
  • sudo mv /tmp/wordpress/* /var/www/html/example.com/

Set the correct permissions so that the web server can have full access to the site’s files and directories:

  • sudo chown -R nginx: /var/www/html/example.com

Nginx Configuration Instructions

Create a new file with name “example.com.conf” under /etc/nginx/conf.d as follows:

  • sudo nano /etc/nginx/conf.d/example.com.conf

Paste the following block and then save the file:

# Redirect HTTP -> HTTPS
#server {
# listen 80;
# server_name www.example.com example.com;

# include snippets/letsencrypt.conf;
# return 301 https://example.com$request_uri;
#}

# Redirect WWW -> NON WWW
#server {
# listen 443 ssl http2;
# server_name www.example.com;

# ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
# ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
# ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem;
# include snippets/ssl.conf;

# return 301 https://example.com$request_uri;
#}

server {
# listen 443 ssl http2;
listen 80;
server_name example.com;

root /var/www/html/example.com;
index index.php;

# SSL parameters
# ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
# ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
# ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem;
# include snippets/ssl.conf;
# include snippets/letsencrypt.conf;

# log files
access_log /var/log/nginx/example.com.access.log;
error_log /var/log/nginx/example.com.error.log;

location = /favicon.ico {
log_not_found off;
access_log off;
}

location = /robots.txt {
allow all;
log_not_found off;
access_log off;
}

location / {
try_files $uri $uri/ /index.php?$args;
}

location ~ \.php$ {
try_files $uri =404;
fastcgi_pass unix:/run/php-fpm/www.sock;
fastcgi_index index.php;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
include fastcgi_params;
}

location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg)$ {
expires max;
log_not_found off;
}

}

After you save& close the above file, execute the following command to verify the configuration of nginx:

  • sudo nginx -t

If no errors are shown in the output of the above command, proceed with restarting nginx for the new configuration to be effective:

  • sudo systemctl restart nginx

You are now Done with the Server-side Configuration

Now open your browser and type the domain name you configured in the nginx file (e.g. example.com) to continue with the Wizard-style installation of WordPress.

Achieve More & Do Less with Managed Server Hosting

NetShop ISP offered Fully Managed hosting for your VPS and Dedicated Server so that you can truly focus on managing your business, not your server.

Simply check the Managed Server option during your checkout and we will handle the rest!

For more information don’t hesitate to contact our Hosting specialists today!