Canadian Web Hosting Blog and News

Canadian Web Hosting offers Intrusion Detection and Protection through their TippingPoint Intrusion System

As a hosting company, one of our biggest and most serious threats is an unauthorized access into our networks. These threats are caused by intruders and viruses – the two most serious issues in our industry.

  1. Intruders who do not have authorized access to a system will probably need to penetrate a system and gather information on a user to access data, programs, and resources. Intruders may also attempt to launch an attack after compromising a system.
  2. Intrusions can vary in severity. Some examples of intrusions include: gaining email access of former employees, guessing/cracking passwords, installing and making use of remote administrative tools, etc.
  3. An Intrusion Detection System (IDS) is a device or application that is used to monitor in/outbound activity to identify suspicious activity. It is an intelligent system looks for a network or system attack to prevent someone from attempting to compromise a system. The IDS is deployed physically as a layer in a network and monitors unauthorized activity in its environment. The IDS assumes that a threat would behave differently than regular activity and that these activities can be quantified.

A secure system should:

    • Stop Threats and improve performance
    • Industry proven, proactive network security
    • Protects your website and revenue generating activities from malicious threats
    • Lowers your bandwidth usage and prevents network abuse
    • Prevents data loss and helps ensure corporate governance and security compliance

To counter intruders and intrusions, Canadian Web Hosting employs an Intrusion Detection System (IDS) and an Intrusion Protection System (IPS) called the TippingPoint Intrusion System.

Every web hosting plan and server on Canadian Web Hosting is protected by our TippingPoint Intrusion System. Our clients can immediately receive alerts when a critical threat is identified to possibly impact a system’s security infrastructure.












How it works:

The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. As packets pass through the IPS, they are fully inspected to determine whether they are legitimate or malicious. This instantaneous form of protection is the most effective means of preventing attacks from ever reaching their targets.

The TippingPoint Intrusion Prevention System is a data-packet inspection system that looks at information packets sent through the Internet before they reach a company's network. The core component of the system is TippingPoint's Threat Suppression Engine (TSE) based on specialized hardware designed by the company. Using parallel processing, the TSE can apply thousands of checks to data packets in an average time of less than 215 microseconds.

The TippingPoint Intrusion Prevention System can be effective against a wide range of potential cyber-attacks including so-called "denial of service" attacks. Denial of service means that attackers attempt to shut down a website by overloading it with a huge traffic spike over a very brief time period. The system can also be used to enhance overall website performance by allowing users to prioritize among applications so that the most important are always kept up and running. The system also includes regular virus blocking updates.

TippingPoint's Intrusion Prevention Systems provide Application Protection, Performance Protection and Infrastructure Protection at gigabit speeds through total packet inspection. Application Protection capabilities provide fast, accurate, reliable protection from internal and external cyber-attacks.

An integral part of the TippingPoint solution is the Digital Vaccine® Service that delivers new filters on a weekly or even daily basis to maintain evergreen protection for the latest vulnerabilities, exploits, viruses and rogue applications.

A data sheet for the TippingPoint Intrusion Prevention System can be found here.

Sheila W.


New PCI data security standard in effect Jan. 1, 2015

Many organizations have been preparing for January 1st, 2015, when version 3.0 of Payment Card Industry’s data security standard (PCI DSS) will come into effect.

 PCI guidelines are very important for small and medium businesses and organizations that process credit and debit cards (whether directly or indirectly).

However, meeting the data security standard doesn't necessarily mean an organization meets and maintains compliance. Businesses should stay on top by preventing intrusions with the following PCI best practices:

1. Maintain compliance for security: Businesses want to look good, which means that they often forget the purpose of meeting PCI DSS compliance is to maintain security of card-holder information and not just to achieve a favourable Report on Compliance (ROC).

2. Have a compliance manager: A designated person or team should have the resources and authority to manage security within a business. This might mean engaging with certain personnel and continuous collection of evidence that shows compliance and effectiveness of PCI DSS.

3. Make security a part of the company's culture: Fulfilling PCI DSS compliance is often not enough to secure all risks. Make a habit of protecting an organization's data and infrastructure and implement risk assessment processes, especially during big changes to the IT environment.

4. Monitor security controls and measure success:  Have a consistent and continuous documentation of the status of security controls, including the implementation and effectiveness of it. Automated control monitoring tools may be helpful and aim to develop metrics used analyze success and effectiveness of your security. Measure implementation (how many systems have password security), effectiveness (how many vulnerabilities have been patched) and impact (how much return is there for your security efforts).

5. Be prepared: Organizations need to be able to respond immediately following security control failures. Have steps set up to restore operations to normal as soon as possible, and then identify the cause of the failure. Then follow up with better security and higher monitoring frequency. When business objectives change or if a key IT security personnel leaves your organization, have change-management practices prepared and analyze associated risk.

6. Commit to security: Maintaining compliance is critical for organizations, but it also means businesses and their executives need to co-ordinate efforts in sustaining that compliance. Allocate enough resources to be successful in building an ongoing PCI DSS program.

Graphic from NAC

Sheila W.


CWH attends Startup Week Vancouver!

Startup Week is back in Vancouver, with featured events including Devlops Day, Insights on Innovation, Techvibes Tech Fest Jobfair, Fireside Chat with Dan Martell (founder of Clarity), Vancouver Impact, and much more. (View the full schedule here.)

Startup Week Vancouver

 We’re excited to be attending these events that feature workshops to help startups and tech businesses. Canadian Web Hosting is a big supporter of new businesses and host for many small to big ones, many of which have been with us from the beginning of their ventures.

With Canadian Web Hosting, startups can rely on experts for guidance and tech support so that you can focus on building your new product and growing business.

For more information about Canadian Web Hosting, visit us at or email


Easily transfer your domain to a new web hosting company

Switching web hosting providers can mean that you prefer to keep your domain registered with the same company for easier customer support. In this case, the domain gets renewed with the new registrar for an additional X number of years and you don’t have to lose the remaining time with the previous registrar that’s already paid for.

So you already have a domain but think transferring it is too complicated? It’s actually way easier than you’d think.

First, log into your current domain registrar or web hosting account, which is typically the place where you can view your account details.

On this registrar backend, you should be able to locate an option to unlock your domain name.

Once unlocked, find your EPP code, also in the backend. Provide this code to your new registrar or web hosting company.

The new registrar will then use your EPP code to pull the domain from your old registrar. They will also see the domain’s owner contact information, i.e. your email address.

Your new registrar will then send an email notification to the email associated with the domain and all you have to do is check this email and verify that you are indeed transferring your domain to a new hosting company. (Just note that domains transferred less than 60 days ago cannot be transferred again until after the wait period.)

Once verified, your new and old registrars will take 3-5 days to transfer your domain. Sit back and relax while they do all the work.

For more help on web hosting and domain registration with Canadian Web Hosting, contact us at 1-888-821-7888 or email


Sheila W.



We’re attending iTech2014 Vancouver!

Canadian Web Hosting and AURO will be attending iTech2014 on October 9th, hosted at the Vancouver Convention Centre.

This is the 12th annual conference, which will feature some key note speakers, including VP Sales of Samsung Canada Enterprise Business Geoff Coutts, Principle Architect at Kaseya Dana Epp, and Blackberry Developer Evangelist Manny Elawar.

There will be networking receptions, vendor sessions, and a chance to meet customers from a wide range of business backgrounds.

We’re excited to meet everyone there, send us a tweet to meet up!

Sheila W.