OVERVIEW

Platform Design Goals & Objectives
UX Strategy
Ensure that site navigation was intuitive for visitors to be able to find the information they were looking for with the least amount clicks.
Ability to deliver affordable website solutions
Deliver affordable website packages with in house financing at 0% interest.
Affordable Online Reviews with Integrations
Deliver affordable online review solution that is included with discounted monthly maintenance subscriptions.
Platform Hosting
After platform build and testing completion client opted to remain on our hosting solution. This allows the client to take advantage of our support model and continued engagement for platform enhancements.
Website Security
Deployment of our backup solution that performs multiple backups of the client website on our secure Amazon S3 servers with our 1-click restore functionality.
Speed Optimization
After platform build and testing completion implemented our speed optimization process to ensure that page load speeds were fast. This includes caching of static pages, image optimization, lazy loading of images, deferring loading of specific content until user reaches it or hovers over a link.
Website Firewall
We deployed our firewall solution that keeps the bots, hackers, and spammers from gaining access. The rules that are set in the firewall will identify any suspicious activity and immediately block it to ensure the protection of the platform.
IP Address Monitoring
We also deployed our intelligent network blocking tactics to prevent traffic coming from specific locations. We utilize a solution that shares IP addresses of known hackers so that we can blacklist them before any potential attempts to gain access. We also automatically block specific attempts on certain account names on the first try, no second chance allowed.
Malware Scans
We leveraged our automated scan that is executed daily to identify any known or new malware, any code that could be considered malicious, and anything that could be considered a potential opportunity to gain unauthorized access. If anything is identified, we will immediately take action to remediate and repair any altered files.
IP Address Monitoring
We also deployed our intelligent network blocking tactics to prevent traffic coming from specific locations. We utilize a solution that shares IP addresses of known hackers so that we can blacklist them before any potential attempts to gain access. We also automatically block specific attempts on certain account names on the first try, no second chance allowed.
Speed Optimization
We leveraged our automated scan that is executed daily to identify any known or new malware, any code that could be considered malicious, and anything that could be considered a potential opportunity to gain unauthorized access. If anything is identified, we will immediately take action to remediate and repair any altered files.
IP Address Monitoring
We also deployed our intelligent network blocking tactics to prevent traffic coming from specific locations. We utilize a solution that shares IP addresses of known hackers so that we can blacklist them before any potential attempts to gain access. We also automatically block specific attempts on certain account names on the first try, no second chance allowed.