Evolving Digital Threats? Storm Security CentreStorm’s award winning Security Centre adapts as your digital landscape evolves, keeping you on the cutting edge from a single centralised location. It takes care of all the heavy lifting for painless hosting security, disaster recovery, and GDPR compliance - saving you up to £860/month in expert fees.
Storm's new Security Centre provides an intelligent 360o approach to security. Real-time site audits display the security configuration and status of each site on the dashboard which provides single-click access to feature configuration options. The technology behind the security centre is automatically updated to help protect against new and evolving online threats, and ensure continuous compliance with changing online security and data protection legislation.
The collective knowledge of 6 million websites powers intelligent security that protects against anything from nuisance comment spam and excessive bot crawling to potentially fatal Cross-Site Scripting (XSS), SQL injection and denial of service (DOS) attacks.
In collaboration with Cloudflare, our team at Storm have developed WebAccelerateTM – technology capable of increasing page load times by up to 200%.
On 25th May 2018, the new GDPR (General Data Protection Regulation) legislation came into effect and applies to all individuals and organisations who store data. Fines of up to £500,000 or 4% of annual turnover are set to be imposed on anyone who does not comply or suffers a data breach. Combining our partnership with Cloudflare with our years of managed hosting and online security experience, we will help ensure that your data is safe, secure and compliant at all times.
How It Works
Real-time site and server audits check the status and configuration of recommended features that can improve your site's security, uptime and speed, disaster recovery strategy, and compliance.
The Security Dashboard’s security options makes it easier to remain protected against online threats and attacks. Security features have been selected and designed in accordance with best practice guidelines such as the National Cyber Security Centre's "10 steps to Cyber Security" , and other recommendations made by the Information Commissioner’s Office (ICO).
Storm extends your business with a 24/7/365 in-house support team that proactively monitors ports and services on your sites and servers for anomalies that could impact connectivity and performance. Outages are addressed as soon as they occur without need for intervention on your part, while Custom Actions elevates your Managed Hosting to a whole new level: tell the Storm Support Team which actions to perform at predetermined times or events for seamless operational continuity.
System-wide daily, weekly, and monthly backups are managed and verified by qualified Storm engineers. Backups can be restored from within the security centre in just a few clicks, and help protect against data loss - whatever the cause. All information and backups are encrypted using AES-256 encryption technology.
If a feature is found to be inactive, out-of-date, or configured incorrectly, a status change will appear on the dashboard and you'll be notified via email. One of our support technicians may also contact you to provide assistance should the status of a priority feature remain critical.
The Security Centre's Vulnerability Scan (PCI Compliant) provides an Audit Trail of your site or server security configuration history. In the event of a breach, this downloadable PDF document can be used to provide ICO auditors and other compliance officers with proof that your site or server was secured to PCI Council standards. As a result you'll be able to reduce the potential for reputational damage and crippling penalties.
The Security Centre makes it easy to meet best practice guidelines such as the National Cyber Security Centre's "10 steps to Cyber Security" , and helps you stay on top of General Data Protection Regulations (GDPR) and the Information Commissioner's Office (ICO) data protection requirements. These features are the result of months of research and the implementation of expert knowledge to help you save time and money, and avoid the unfortunate and sometimes expensive results of non-compliance or insufficient site security.