Press Sites

IN-DEPTH SYSTEM CARE
COMPUTER PROTECTION
ANTI-THEFT SECURITY
MOBILE GUARDIAN
INVOKING SIMPLICITY
PASSWORDS
CONVENIENTLY ORGANIZED
PRODUCTIVITY
BLOG WITH AMBITION
WORDPRESS SITES
OVERSEEING CONNECTIONS
NETWORK MONITOR
FREEDOM TO EXPRESS
PRIVATE MAIL

Press Sites

MyITAssistant Press Sites is designed specifically for WordPress website hosting, streamlined for maximum performance, stability, and functionality. A better solution and experience for everyone.

Press Sites is a server free experience, nothing to manage, update, or secure. It is expertly curated hosting that helps you build, optimize, and grow.

Security is an advantage of Press Sites hosting. Since WordPress is the only framework the infrastructure will have to handle, services that are not needed to run WordPress are disabled. When you combine this with regular updates to the WordPress core and plugins, you have a secure, protected environment.

Our Press Sites solution includes both iThemes Sync Pro and iThemes Security Pro plugins. Sync Pro tracks updates for WordPress and plugins, letting the owner know what’s available. With a click of a button, updates are pushed and updated on the website. Security Pro manages all aspects of security for the website. It’s by far the best WordPress security plugin to secure and protect WordPress.

  • Extra Protection for WordPress User Logins
  • Brute Force Protection
  • File Change Detection
  • Malware Scanning
  • Version Management
  • 25+ more features
  • Press Sites automatically performs a backup of the entire site and database daily. Backups cycle every 30-days, allowing time for offsite download if needed.

    Press Sites, everything a website needs to perform optimally, securely, and sustainably.

    Key Elements

    Finding the right hosting services for your WordPress website can be a daunting task. There are many options and features to consider. With Press Sites, we have made it simple. Site owners can focus on the site itself rather than the details and conditions of the server.

    • No overage fees, traffic limits, or metered pageviews

    • Worry free automatic plugin updates with visual comparisons

    • Image optimization plugin included to improve page-speed

    • iThemes Sync and Security Pro

    • Automatic SSL certificate

    • Staging site for development

    Press Sites
    Starting at $20 month
    Did you know?
    71 percent of breaches reported were financially motivated.
    There is a hacker attack every 39-seconds , on average.
    Emotet used over 290,000 compromised email addresses to spread malware, including 33,000 unique attachments.
    By 2020, the estimated number of passwords used by humans and machines worldwide will grow to 300 billion.
    95% of cybersecurity breaches are due to human error.
    Attacks on IoT devices tripled in the first half of 2019.
    Ransomware damage costs will rise to $11.5 billion in 2019 and a business will fall victim to a ransomware attack every 14 seconds at that time.
    On going threats like Ransomware and Cryptomining will continue to grow.
    56% of Americans don’t know what steps to take in the event of a data breach.
    Total cost for cybercrime committed globally will reach $6 trillion by 2021
    Google was fined $57 billion for GDPR violations by CNIL, a French data protection agency.
    1 in 36 mobile devices had high risk apps installed.
    Malware rates as the most expensive, with an attack costing victims up to $2.6 million.
    The average time to identify a breach in 2019 was 206 days.
    In 2017, 147.9 million consumers were affected by the Equifax Breach.
    95% of cybersecurity breaches are due to human error.
    Fileless attacks grew by 256 percent over the first half of 2019
    Kaspersky says that its web antivirus platform identified 24,610,126 “unique malicious objects” in 2019.
    94% of malware is delivered via email
    Securing a computer is no longer just doing updates.
    The United States is #1 for targeted attacks.
    $17,700 is lost every minute due to phishing attacks
    Damage related to cybercrime is projected to hit $6 trillion annually by 2021.
    48% of malicious email attachments are office files.
    In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time.
    Most malicious domains, about 60%, are associated with spam campaigns.
    The worldwide information security market is forecast to reach $170.4 billion in 2022.
    Data breaches exposed 4.1 billion records in the first half of 2019.
    Financial services had 352,771 exposed sensitive files on average while Healthcare, Pharma and Biotech have 113,491 files on average.
    WannaCry ransomware attack cost the National Health Service (NHS) over $100 million.
    1 in 13 web requests lead to malware.
    By 2020, security services are expected to account for 50% of cybersecurity budgets.
    Malicious PowerShell scripts blocked in 2018 on the endpoint increased 1,000%.
    In 2018, an average of 10,573 malicious mobile apps were blocked per day.
    IoT devices experience an average of 5,200 attacks per month.
    Approximately $6 trillion is expected to be spent globally on cybersecurity by 2021
    100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion.
    More than 77% of organizations do not have a Cyber Security Incident Response plan.
    64% of Americans have never checked to see if they were affected by a data breach.
    60 percent of breaches involved vulnerabilities for which a patch was available but not applied
    In 2017, 412 million user accounts were stolen from Friendfinder’s sites.
    Protecting privacy on a computer is a continual task.
    Ransomware detections have been more dominant in countries with higher numbers of internet-connected populations. The United States ranks highest with 18.2% of all ransomware attacks.
    Backing up data is no longer something to set and forget.
    In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers.
    The average lifecycle of a breach was 314 days (from the breach to containment).
    Phishing attacks account for more than 80% of reported security incidents
    Data breaches cost enterprises an average of $3.92 million
    34% of data breaches involved internal actors.
    The top malicious email attachment types are .doc and .dot which make up 37%, the next highest is .exe at 19.5%.
    Since COVID-19, the US FBI reported a 300% increase in reported cybercrimes.
    40 percent of IT leaders say cybersecurity jobs are the most difficult to fill
    Today’s technology and security risks are more complicated.
    The estimated losses in 2019 for the healthcare industry are $25 billion.
    The most expensive component of a cyber attack is information loss at $5.9 million
    Connected IoT devices will reach 75 billion by 2025.
    1 in 3 Americans will be affected this year by an attack.
    90% of remote code execution attacks are associated with cryptomining.
    Security breaches have increased by 11% since 2018 and 67% since 2014.
    More than 93% of healthcare organizations have experienced a data breach over the past three years. 57% of those have had more than five data breaches during the same timeframe.
    An attacker resides within a network for an average of 146 days before being detected.
    Most companies take nearly 6 months to detect a data breach, even major ones.
    The cost of lost business averaged $1.42 million.
    63 percent of companies said their data was potentially compromised within the last twelve months due to a hardware- or silicon-level security breach
    Latest Threats
    Egregor Ransomware: Egregor ransomware exfiltrates sensitive information before encrypting files and gives the victim three days to contact the threat actor or the stolen data will be posted online. The malicious software is a variant of the Sekhmet ransomware family and uses multiple techniques to bypass defense measures including obfuscation, software packing, and sandbox evasion. The ransom note reports the actor is willing to provide security recommendations to the victim to avoid being breached again.
    Phobos Ransomware: The Phobos ransomware uses AES encryption and adds various extensions to infected files. Phobos was identified late 2017 with new variants discovered throughout 2019 and into 2020. Victim’s are required to communicate with the threat actor(s) via email at one of many email addresses used to obtain a decryption key. Analysis of Phobos has identified similarities shared with other ransomware families such as Dharma and CrySiS.
    Turla: Based on OSINT, TTP, and malware analysis, results are received and assessed on a daily basis. The Threat Activity events, in particular, share the indicators that cannot be tied to a specific dedicated operation or name but indicate malicious activity by the threat actor group, in this case, possibly the Turla group. Turla threat group has infected victims in over 45 countries, spanning a range of industries including government, embassies, military, education, research, and pharmaceutical companies since 2004. The heightened activity was seen in mid-2015. Turla is known for conducting watering hole and spear-phishing campaigns and leveraging in-house tools and malware. Turla’s espionage platform is mainly used against Windows machines but has also been seen used against macOS and Linux machines.
    Remcos RAT: Remcos is a remote access technology that is developed and maintained by the cyber security firm BreakingSecurity. It is advertised as a legitimate tool which allows remote control and surveillance of a target machine. Remcos is available as freeware and a fee based professional version and has been widely available in criminal forums since the second half of 2016. Features such as a keylogger, camera capture, microphone access and remote control made the software attractive to criminals. Due to the nefarious use of Remcos it is labeled as malware and has most recently been seen delivered through malspam campaigns that aim to compromise systems.
    Conti Ransomware: The Conti ransomware family was discovered using multiple techniques to find files to attack and how the encryption process is carried out. The malware uses multiple threads to encrypt files at a faster rate compared to other ransomware families and contains command-line options to scan for local files as well as remote files over SMB shares. Conti also uses the Windows Restart Manager to free up files that are open by various applications. The ransomware uses AES-256 encryption and requires the victim to email the threat actor for the decryption key. Variants of the malware post stolen data from entities who refuse to pay the ransom.
    Donot Group: The APT group Donot (also known as APT-C-35, Donot Team) has been active for several years, the exact start date is still unknown. The attackers are interested in confidential information and intellectual property. APT-C-35 targets mostly countries in South Asia; Bangladesh, Thailand, India, Sri Lanka, the Philippines in particular, state sector of Pakistan and outside of Asia, in places like Argentina, the United Arab Emirates, and Great Britain. Donot Team is known for utilizing multiple attack vectors to gain a foothold on targets of interest, from developing Android malware for mobile devices to malspam campaigns delivering malicious documents. The maldocs contain embedded DLL’s and often referenced geopolitical themes, for example: “The New US Administration”. Donot Team’s development of mobile malware included fake Android APKs that were meant to exploit Google’s Cloud messaging service, bypass detection and act as a Command-And-Control (C2). The origin of Donot Team is unclear; however, it is speculated that Donot Team may have ties to India due to targets of interest, analysis of malware code and infrastructure re-use.
    APT32 Group: APT32, also known as OceanLotus, is a known threat group that was first identified in 2012 in an attack that targeted Chinese entities. After which the groups targets expanded to various countries across Asia. The threat group has mostly focused on seeking intellectual property as well monetary gain but have targeted Journalists and dissidents. Tactics, Techniques, and Procedures have included the use of custom tools as well as commodity malware including Goopy, KOMPROGO, PHOREAL, SOUNDBITE, WINDSHIELD, Cobalt Strike beacons, PowerShell-based tools, and Mimikatz.
    TrickBot Banker: TrickBot is one of the most popular type of trojan. It started first in 2016 as a banking trojan and has evolved with spyware capabilities. It is customisable to make it more effective and profitable. This means that not all TrickBot infections will be the same. TrickBot is not openly advertised, but is only distributed across an elite group of criminals in the underground. TrickBot infects machine most often through malicious documents. Once installed on a target system, TrickBot will download other types of malware.
    Backdoor Returns: Bandook is a type of RAT that appeared between 2015 and 2017 in campaigns dubbed Operation Manul and Dark Caracal. During the year 2020, Bandook has resurfaced, and analysis suggests the backdoor being developed and provided by a third-party service. Systems are infected when users get tricked into downloading a malicious script, which in turn downloads and execute a sequence of payloads to finally install the backdoor. The backdoor itself is equipped with tooling that provides screen captures and remote file manipulation.

    Pricing

    Unheard of Hosting Package

    Everything needed to successful protect at a fraction of the cost.

    WordPress hosting at its best! All the bells and whistles needed to keep site secure, up-to-date and development ready. Go with a Press Site for single domains.

    Press Site
    Single Domain
    $20/mth*
    • FEATURES: Dedicate WordPress server, iThemes Sync Pro, iThemes Security Pro, daily site backup/restore, automatic updates, development staging, SSL certificate, secure SFTP.
    • LICENSE: 1 domain
    Press Site xE
    Multiple Domains
    $80/mth*
    • FEATURES: Dedicate WordPress server, iThemes Sync Pro, iThemes Security Pro, daily site backup/restore, automatic updates, development staging, SSL certificate, secure SFTP.
    • LICENSE: 5 Domains

    Website DNS Management

    Improving speed and security of domain communications.

    Every domain benefits by protecting its DNS. Stop attacks and improve communications performance, stability and overall security. We highly recommend Press Site DNS xE for all domains.

    Press Site DNS
    Standard Protection
    $3/mth*
    • FEATURES: Global load balanced CDN, static content caching, instant full cache purge, accelerated mobile links, async JavaScript loading, DDos mitigation, reputation-based threat protection, comment spam protection, content scraping protection, DNSSEC, wildcard DNS
    • LICENSE: 1 Domain
    Press Site DNS xE
    Improved Protection
    $30/mth*
    • FEATURES: Global load balanced CDN, static content caching, instant full cache purge, accelerated mobile links, async JavaScript loading, DDos mitigation, reputation-based threat protection, comment spam protection, content scraping protection, DNSSEC, wildcard DNS, DDoS alerts, stop bot abuse, accelerate applications, optimize web experience, site analytics, image optimization, mobile optimization, cache analytics
    • LICENSE: 1 Domain

    Cheap Domain Registration

    Lowest pricing possible. You pay exactly what we pay.

    Every registered domain through us is private and at the lowest possible rate. NO BAIT AND SWITCH here! Claim your domain and lock it in!

    Domain Register
    .ORG
    $10.11/yr*
    • FEATURES: Any domain with the extension .ORG that is available. Registered domain is private with personal data redaction on WHOIS.
    • LICENSE: 1 Domain
    Domain Register
    .COM
    $8.03/yr*
    • FEATURES: Any domain with the extension .COM that is available. Registered domain is private with personal data redaction on WHOIS.
    • LICENSE: 1 Domain

    Still have questions? Give us a call at

    * Pricing is based on Cash, Check, E-Check, and Zelle payment methods. Credit cards and direct bank transfer payments options are available with transaction fees.