Jump to main contentmickwood.com - Website Hosting & Design for Christian Organisations
Romans 4:20,21 - Yet he did not waver through unbelief regarding the promise of God, but was strengthened in his faith and gave glory to God, being fully persuaded that God had power to do what he had promised.

Network Security

We implement a number of security features to protect your Web site and data including:-


A Firewall is a security system that acts as a protective boundary between a network and the outside world by filtering information coming from the Internet into our computer systems. If an incoming packet of information is flagged by the filters it is not allowed through. For example, we could instruct the firewall to block any packet with the word "X-rated" in it. A firewall can also implement security rules.

Without a firewall in place all of our computers would be directly accessible to anyone on the Internet. A person who knows what he or she is doing could probe and access our computers.

Virus Protection

Probably the most well-known threat is the computer virus. A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing all of your data.

Email virus scanners have been installed on each of our servers. Virus scanners will scan all incoming and outgoing email, and will inform the recipient and sender of an infected message.

Intrusion Detection (ID)

ID is the art of detecting inappropriate, incorrect, or malicious activity by individuals attempting to access and manipulate information and cause computer systems to be unreliable or unusable.

Sometimes, a distinction is made between misuse and intrusion detection. The term intrusion is used to describe attacks from the outside. Misuse is used to describe an internal attack.

Port Scanner Blockers

Hackers may try to identify possible security problems in our operating systems, and the applications running on them, using Port Scanners. Port Scanner Blockers prevent hackers from identifying and exploiting such weaknesses.


RAID 1, also called Disk Mirroring, is installed on our servers in case there is a disk crash. Basically we write all of your data to two separate hard disks installed on the server. One is a mirror of the other. Should the primary disk experience a hardware failure, the mirror disk will continue operations as if nothing had happened. All of your data is protected. We also have backups that can be restored if the RAID1 fails.

welcome | name | hosting | design | content | promote | update | showcase | support
about us | general | articles | accessibility | sitemap | enquiries | feedback | training | consultancy

Welcome Showcase Support Update Promote Content Design Hosting Name