CityHost.UA
Help and support

Security

blog 571 What Is the TLS Protocol, How It Works, and What It Protects Against
 2587

TLS is your invisible guardian on the Internet. It protects your data, which is essential for safe browsing and reliable hosting services.

blog 535 Scammers on Facebook – How to Protect Your Business Page from Theft
 5579

Losing your business page on Facebook can cause serious damage to lead to personal data leaks. How to prevent the theft of a business page?

blog 503 Cityhost.ua technical support — how it works
 4052

Technical support is the face of business, because it is after communication with its specialists that clients get an impression of the service's operation.

blog 483 Server health monitoring, backup and data security - what hosting customers need to know
 3802

What do you need to know if you rent a server? Read tips from our technical support on proper server operation.

blog 554 What Are Cookies and Why Are They Needed
 5052

Read in the article what cookies are, what information they store, and whether they can be dangerous for users.

blog 522 Workplace Cybersecurity — Information Hygiene Rules for Company Leadership and Employees
 5144

What is cybersecurity, common types of cyber attacks, and how to protect your company from them — all in the latest article from our team.

blog 497 How to protect a WordPress site and not become a victim of open source vulnerabilities
 3514

The security of a Wordpress site can be compromised by vulnerabilities in themes and plugins. How to protect WordPress from hacking - read in the article.

blog 471 Bad bots: how they harm the site and how to block them
 6034

Bad bots not only create additional load, but can also cause serious damage to the site. How to detect bots on the site and block them?

blog 541 March 31 — Backup Day. Why it's important not to forget about backups and how to make a backup of your website (instructions)
 6996

On the eve of Backup Day, we talk about the features of backups, strategies and the best ways to create backup copies of a website.

blog 507 How to verify a user on the site: calls, SMS, e-mail
 9869

If your site has personal accounts for users, it is important to find a reliable method of verification to keep their data safe.

blog 491 How to start a video surveillance system on the server

A dedicated server can be used for many purposes, and among them is the organization of video surveillance in an enterprise or store.

blog 448 TOP-11 advantages of domain registrar and hosting provider Cityhost

In this article, we have collected all our advantages for you — from the technical intricacies of working with the platform to customer support and the social component.