02 8005 7353
Velocity Host Logo
(vh) New Logo

NEW: Automated Backups & Self Service Restores

Automated Backups & Self Service Restores Intro Banner

A Story Of Automated Backups & Self Service Restores

We’re always on the lookout to improve services and deliver incredible value to clients. Recently we introduced three new SMB shared hosting plans specifically designed to cater for a range of business uses; from small Start-Ups to Established businesses and Pro packages catering to all business types.

In designing these new packages we consulted heavily with clients really listening to pain points on how we could help our SMBs manage their data better. A strong theme kept surfacing – the management of backups and file restores was an area desperately needing improvement.

The Old Way: Clunky Backups & Restores

By default, cPanel provides a very basic method for backing up your hosted data, which is the all or nothing approach. These backups live in the same hosting space as your site files and can become excessively data-heavy, consuming a large chunk of your allocated hosted storage space if not regularly removed.

When you revert to a previous backup in cPanel, it actually overwrites all the current data (so it’s gone forever!) which means that it isn’t possible to simply restore a specific file, email or DB.

This only left you with the painstaking option of downloading the entire backup to your desktop, digging through all those files and folders and trying to find the data you actually need. Clearly not an ideal scenario, not to mention very time-consuming.

Continue Reading No Comments

Spectre And Meltdown Industry-wide Impact

Important Update:
Spectre And Meltdown Security Vulnerabilities estimated 5-30% performance hit across the board

Spectre And Meltdown Security Vulnerabilities

Global Industry-wide Impact

Over the last week, the IT industry has been advised of new security vulnerabilities that affect all Intel, AMD, ARM and other CPU vendors. Industry information advises these CPUs have a security vulnerability which allows malicious code to be executed by applications to gain access to any data that resides within the CPU and cache.

This includes any data you have entered into browsers, files you have opened, etc which contain any and all levels of information from public to sensitive.

Continue Reading 1 Comment