One place for hosting & domains

      The Top 22 Web Safe Fonts to Use on Your Website


      Whether you’re a budding professional web designer or a DIY business site builder, you may have come across the term “web safe fonts.” This is an important element for any successful design, but finding and using the best typefaces for the web can be tricky.

      Fortunately, web safe fonts are easier to access and incorporate into your website than you think. They not only ensure consistency across your branding but also provide advantages in terms of User Experience (UX) and Search Engine Optimization (SEO).

      This article will explain what web safe fonts are and why they’re important from a web design perspective. Then we’ll share some popular examples, resources where you can acquire them, and instructions for using them. Feel free to use the links below to jump to the section that most interests you.

      There’s a lot to cover, so let’s get started!

      An Introduction to Web Safe Fonts (And Why They Matter)

      A web safe font is simply a typeface that is viewable on most devices, including desktop and mobile. Typically, they come pre-installed on each Operating System (OS).

      This is important because if a visitor tries to view your website and it uses a font that is not installed on their device, they will see a generic typeface such as Arial or Times New Roman instead. In some cases, your content may even become unreadable on certain devices.

      Of course, the latter situation is undesirable, as users won’t typically stick around if they can’t read your site. However, even having to display a generic font family can disrupt your website’s overall design. It may also lead to inconsistencies in your branding.

      In some cases, using web safe fonts may improve your pages’ loading times. Since they are pre-installed on most popular operating systems, modern browsers don’t have to download them from your server while rendering your site. This can improve both UX and SEO.

      Struggling to Choose a Specific Font?

      Don’t worry; when you partner with DreamHost, you get access to WP Website Builder and more than 200+ industry-specific starter sites for free!

      The Top 22 Web Safe Fonts to Use on Your Website

      Fortunately, there are many different web safe fonts out there that you can choose from when designing your site. Finding one that matches your brand’s tone and personality shouldn’t be too much of a challenge.

      To give you a head start, we’ve rounded up some popular choices for your consideration. Let’s start with the basics and then take a look at a few more unique options.

      1. Arial

      The Arial font.

      Many designers see Arial as simple or boring, but you can’t deny that it’s a tried and true web safe font. This is perfect for use as a fallback for a more unusual (and not always available) typeface. Plus, it’s highly legible.

      2. Times New Roman

      The Times New Roman font.

      If you appreciate the reliability and simplicity of Arial but would prefer a serif font, Times New Roman is the way to go. Although it’s also somewhat lacking in personality, you can rest assured that it will be viewable on any device.

      3. Helvetica

      The Helvetica font.

      Helvetica is a sans serif font that many prefer as an alternative to Arial. It’s purposefully designed to be industrious and lacking in personality, making it useful for documentation or other no-frills content that you want to make sure is readable.

      4. Calibri

      The Calibri font.

      Calibri is another basic sans serif font, similar to Helvetica and Arial. It has been the default font for Microsoft Office for several years now and is an excellent pick for modern businesses and e-commerce sites. By using an unassuming, unintrusive font, you can draw more attention to your products and services.

      5. Georgia

      The Georgia font.

      Classy, serifed Georgia has a timeless look that adds to your website’s tone and style without overwhelming the design. It’s ideal for lifestyle blogs and brands that want a slightly softer, not-too-edgy feel.

      6. Cambria

      The Cambria font.

      Cambria is similar to Georgia, but with a slightly more modern twist. Its serifs are a little more subtle, which can make it easier to read – especially on smaller screens.

      7. Veranda

      The Veranda font.

      Veranda was designed specifically for on-screen use, and as a result, is particularly easy to read on all devices. It has a classic feel and certainly won’t distract from your content. It adapts well to headings or body text, so you can use it for just about any kind of content.

      8. Tahoma

      The Tahoma font.

      Tahoma is another clear and easy-to-read sans serif font. It’s flexible enough to work well for business sites, blogs, creative portfolios, or whatever else you need it for. The characters are clean, uniform, and easy on the eyes.

      9. Trebuchet

      The Trebuchet font.

      Designed for readability and usage in signs, Trebuchet is the perfect font for headings and titles. It also retains its legibility at smaller sizes, so don’t hesitate to use it in your body text as well.

      10. Century Gothic

      The Century Gothic font.

      Sleek, clean, and geometric, Century Gothic makes a bold statement in headings and titles. If Arial and Helvetica are too plain for your tastes, but you still want a sharp sans serif font for your site, this one is worth considering.

      11. Didot

      The Didot font.

      Classic, elegant Didot gives off an intellectual feel that would be well suited to a university site or even some blogs or startups. It features clean, straight lines with minimalist serifs that don’t take away from the text too much.

      12. Bodoni

      The Bodoni font.

      This eye-catching serif typeface is a more interesting alternative to the standard Times New Roman. Edgier than Georgia but not as in-your-face as something like Courier New or Rockwell, Bodoni a great middle-ground if you want your text to have some flair without taking over the design.

      13. Calisto

      The Calisto font.

      Calisto’s soft lines and dainty serifs give it a feminine air perfect for lifestyle blogging or female-run startups. Its tight spacing may not lend itself well to long blocks of text, but it will look stunning in headings and titles.

      14. Candara

      The Candara font.

      Featured in Microsoft’s ClearType Font Collection, Candara is often seen as one of the less modern-looking sans serif fonts. It projects an open, easy-going attitude that could lend a memorable tone to your website and brand.

      15. Optima

      The Optima font.

      It can be hard to inject a lot of personality into a sleek and clean sans serif typeface, but Optima certainly accomplishes this. It’s memorable enough to lend itself well to developing your brand identity but won’t make long passages feel cluttered or intimidating to readers.

      16. Palatino

      The Palatino font.

      An ideal font for digital magazine headlines and other text that needs to make a bold statement, Palatino is a classic serif font. It feels a little less structured than Georgia and has much more personality than your standard Times New Roman.

      17. Quicksand

      The Quicksand font.

      Quicksand is a modern font designed to look good on mobile devices. It’s simple and not too flashy, but still shows enough quirky personality to keep your body text interesting. This fairly streamlined typeface is easy to read as well, making it a solid pick for text-heavy sites.

      18. Courier New

      The Courier New font.

      Courier New is a quirky font that is highly recognizable and packs a lot of personality. It is the perfect choice if you want your site to have a more vintage feel and are looking for a strong font that will convey your brand’s identity.

      19. Rockwell

      The Rockwell font.

      Rockwell’s distinctive serifs are reminiscent of Courier New, only without the overwhelmingly vintage vibe. It may be a little more difficult to read on smaller screens and at smaller sizes, but it can be a fun font for headings and titles.

      20. Garamond

      The Garamond font.

      Garamond is a timeless font originally designed in 1615. Unfortunately, it’s easier to read in print than on the web. However, you can still make use of it as an accent typography font in headings, or perhaps even as a part of your logo.

      21. Copperplate

      The Copperplate font.

      This highly distinctive font is hard to miss and brings an industrial, official feel to your text. Copperplate is the ideal typeface for drawing attention to your headlines or logo. Unfortunately, it could become hard to read when used for smaller body content.

      22. Impact

      The Impact font.

      Aptly named, Impact is a statement font that you may want to reserve for headings and titles. This heavy font packs a punch and grabs readers’ attention as they scroll your blog roll or skim your posts for key information.

      Don’t Sweat the Font Size

      Whether you need help finding a different font, designing a custom site, or downloading a font file, we can help! Subscribe to our monthly digest so you never miss an article.

      Where to Download Web Safe Fonts

      In short, you shouldn’t have to download web safe fonts. Since they’re already pre-installed on all popular operating systems, you can simply code them into your site using CSS, and they should appear as intended across all devices.

      With that being said, if you feel the need to download a web safe font for some reason, you can find them in most of the popular font libraries, such as Google Fonts, DaFont, or FontSpace.

      However, keep in mind that just because a typeface is available via one of these resources doesn’t automatically mean it’s web safe.

      How to Add Web Safe Fonts to Your Website

      You can add fonts to your website with CSS. The best practice is to include your preferred font (which may or may not be web safe) and a fallback font (which should always be web safe). This way, if your primary font choice is not compatible with a user’s operating system, you can still have a say in the backup font that’s shown in its place.

      There are a few different options for adding the CSS to incorporate web safe fonts on your website. If you’re using WordPress, you can put it in the Additional CSS section of the Customizer.

      The Additional CSS section in the WordPress Customizer.

      Alternatively, you can change your website’s font in its stylesheet (style.css). There should be a fonts and typefaces section of this file where you can specify which fonts should be used for different types of text.

      Here’s an example:

      p {font-family:Montserrat,Arial,sans-serif; }

      In this snippet, we’ve set the paragraph text to display the Montserrat font first. If a user’s device doesn’t have Montserrat installed, Arial will be used instead. You can include more than two fonts if you wish and use different fonts for body text, headings, and titles.

      Do You Have a Favorite Web Font?

      If you’re not an experienced designer, it’s easy to overlook the importance of your website’s font. However, this element plays an important role in your branding. Choosing a font that isn’t viewable on all devices can disrupt the UX or even prevent visitors from reading your content entirely.

      In this post, we’ve explained the significance of web safe fonts and how you can add them to your site. We also shared 22 options that you can use in your upcoming designs, including common sans serif fonts such as Helvetica, classic serif fonts like Georgia, and some unique options, including Courier New and Quicksand.

      Are you ready to start designing your new site? With our shared website hosting plans, you can have it up and running in no time. Check them out today!



      Source link

      How to Keep your IT Infrastructure Safe from Natural Disasters


      Costly natural disasters—think disasters that cost over $1 billion—are occurring with increased frequency. According to the National Oceanic and Atmospheric Administration, there was an average of 6.3 annual billion-dollar events from 1980-2018, yet in the last five years alone, the average doubled to 12.6.

      Last year, natural disasters cost the U.S. $91 billion, and there were 30 events in total over 2017 and 2018 with losses exceeding $1 billion.

      Whether the event is a hurricane, flood, tornado or wildfire, businesses can be blindsided when they do happen. And many businesses are woefully unprepared. As many as 50 percent of organizations affected won’t survive these kinds of events, according to IDC’s State of IT Resilience white paper.

      Of those businesses that do survive, IDC found that the average cost of downtime is $250,000 per hour across all industries and organizational sizes.

      Imagine what would happen if your business takes a direct hit and your data, applications and infrastructure are disabled. We all know that these events are unpredictable, but that doesn’t mean that we can’t do something now to prepare for any eventuality.

      Here are a few basic steps you should take to protect your IT infrastructure and keep your business up and running after a natural disaster.


      LEARN MORE

      Perform a Self-Evaluation

      The first step in protecting your sensitive information is to determine exactly what needs to be safeguarded.

      For most companies, the biggest risk is data loss. Determine how many instances of your data exist and where they are located. If your company only performs backs up onsite or even stores data off-site with no additional backup, you need to reevaluate your strategy. Putting all your eggs in one basket makes it easy for your information to be wiped out by natural disasters.

      Think About Off-Site Backups in Different Locations

      If you do use off-site backups for your information, you’re taking a step in the right direction, but depending on their physical location, your data might not yet be fully protected.

      Consider this scenario: Your business is headquartered in San Francisco and you back up your data in nearby Silicon Valley. A massive earthquake strikes the Bay Area (seismologists say California is overdue for the next “big one”), disabling your building as well as the data center where your backup data is located. Depending on the size of the disaster it could take hours, days or even weeks before your data is accessible. Would your company be able to survive this disruption?

      A smarter option would be to select a backup site that’s not in the same geographic region, reducing the chances that both locations would be impacted by the same disaster.

      Consider the Cloud

      An option becoming more popular with businesses is to utilize cloud storage as their backup solution. INAP provides a cost-effective and scalable storage option, providing a flexible and dependable cloud storage solution.

      Another dependable and more robust option, Disaster Recovery as a Service (DRaaS) replicates mission-critical data and applications so your business does not suffer any downtime during natural disasters. DRaaS provides an automatic failover to a secondary site should your main environment go down, while allowing your IT teams to monitor and control your replicated infrastructure without your end users knowing anything is wrong.

      Think of DRaaS as a facility redundancy in your infrastructure, but rather than running your servers simultaneously from multiple sites, one is just standing by ready to go in case of an emergency.

      To learn more about INAP’s backup and disaster recovery solutions, sign up to receive your free consultation with a data center services expert today.

      Don’t Wait Until It’s Too Late

      It’s never a bad time to evaluate your disaster recovery strategy. But if you’re waiting for a natural disaster to come barreling toward your city, then you’re waiting too long to establish and activate your backup strategy.

      It’s just up to you and your IT team to determine which services are most appropriate for your business needs.

      Explore INAP Cloud.

      LEARN MORE

      Laura Vietmeyer


      READ MORE



      Source link

      What Is Malware? Here’s What You Need to Know to Keep Your Website Safe


      Malware is one of the great boogeymen of the internet. It’s been around longer than the web itself and continues to be a threat to website owners, developers, and internet users to this day. If you don’t understand what malware is and how it can affect your site, you’re leaving yourself vulnerable.

      However, as malware evolves, so do the tactics for protecting against it. While malware can affect almost every site and device, if you educate yourself on how it works, you’ll have a good foundation for protecting yourself. Even better, there are a number of basic techniques you can use to strengthen your website against attacks.

      In this guide, we’ll go all the way back to the early days of the internet and discuss malware from its beginnings to the modern day. We’ll also explore some of the most common forms of malware and how they affect your site. Finally, we’ll show you how you can protect your WordPress site from malware. Let’s get started!

      The History of Malware

      Malware refers to any software developed with the intention of causing damage or gaining access to someone else’s system. In fact, the word itself is short for malicious software. Malware is sometimes simply referred to simply as viruses, but that is a reductive description. In reality, malware includes a wide variety of programs with multiple purposes and methods.

      The history of malware stretches almost as far back as the dawn of personal computers. It’s thought that the first piece of malware to reach the public was Elk Cloner, written by 15-year-old student Rich Skrenta as a joke. It was spread on a game disk that would display a poem after a certain amount of time. The program would also copy itself onto the computer’s memory and, after that, be automatically copied onto any disk that was inserted into that machine.

      While Elk Cloner did little actual harm to the infected devices, it was only the harbinger of things to come. As personal computers became more common from the mid-1980s onwards, malware also became more prevalent. Few programs were as harmless as Skrenta’s creation.

      One early example is CIH, which would cause massive damage to both software and hardware. It’s estimated that CIH infected over 60 million devices for a total of $1 billion in damages.

      At the time, malware was primarily delivered via disks so it was mainly spread on shared networks (such as those in universities and libraries). However, with the appearance of the internet, a new era of malware emerged. Today, malware can be spread online much faster than before and infect more sites and devices than ever.

      How Malware Works Today

      The trickiest thing about malware is that it’s often delivered under the radar so you don’t notice anything until it’s too late. It can be sent via email, added to a website so that it infects visitors, or hidden within a seemingly innocent program. There’s even such a thing as fileless malware, which affects your memory but doesn’t leave any trace on your hard-drive (to avoid detection).

      In short, malware is a lot more sophisticated today than when it relied on floppy disks. It’s also a lot more insidious and dangerous with a more focused purpose. In the past, viruses and other malware were usually created with the intent to brag or annoy others. Now it’s a money-making industry, encompassing networks of developers who are working full-time to create new ways of spreading unwanted, harmful software.

      If that sounds frightening, it probably should. As a website owner, malware can affect you in several ways. In the worst case scenario, attackers could access your site and leak sensitive information. They can also insert malware that infects the devices of people who visit your site. For example, this could be done by adding JavaScript to banner advertisements.

      The sad fact is that no device or site is ever completely secure. Malware is an industry that’s continuously improving and changing its methods, so you’ll never want to assume you can rest easy. Not even Internet of Things devices are safe. To defend yourself against this threat, you’ll need to learn as much about it as possible.

      Be awesome on the internet. Join our monthly newsletter to get tips and tricks for making the most out of your online presence.

      9 Types of Malware (And How They Affect Your Site)

      We’ve spoken about malware from a general perspective up until now. However, as we mentioned earlier, there are many different types out there. Let’s look more closely at some of the most prevalent kinds of malware and how they can impact your WordPress site.

      1. Computer Viruses

      This is arguably the most famous type of malicious programming — to the point that virus is commonly used as a synonym for all malware. In reality, a computer virus refers to any software that replicates itself and adds its own code into other programs. That’s why we use the term infected to describe the affected system.

      Since it hides its own programming inside some other software’s code, a virus can be used to perform almost any task. This task is known as its payload and can affect your site in numerous ways. For example, a virus could be used to access sensitive information, delete important data, hog site storage and server resources, or replace your content with spam.

      To protect yourself, you’ll need antivirus software. It’s likely you already have this installed on your computer and devices, but it’s a must for websites as well. Some web hosts offer built-in protection as part of their plans, which will help to stop most common attacks. You may also want to consider a WordPress security plugin that will scan your files for unwanted content, including viruses.

      2. Trojan Horses

      The Trojan horse myth is the story of how the Greek army managed to enter the besieged city of Troy in order to destroy it from the inside. They did so by gifting the Trojans a giant wooden horse that was secretly loaded with Greek soldiers. Surprise! When the horse was brought inside the city gates, the hidden soldiers jumped out and overtook the city.

      The horse’s modern-day namesake functions in much the same way. A trojan horse is a piece of software that appears to be doing one thing, while hiding its true functionality. For example, this could take the form of a screensaver that secretly corrupts files or drains your device’s memory.

      On WordPress websites, trojan horses can be plugins that claim to do something helpful while actually running malicious code in the background. This usually happens when you install pirated plugins or themes, which attackers can use to add backdoors and access your site’s data.

      To avoid this, make sure you’re careful about what you add to your site. It’s vital to always use trusted plugins from reputable, secure sources. This probably goes without saying, but pirating software is a lose-lose situation, both for you and its creators. Just say no.

      3. Cryptocurrency Miners

      The growing popularity of cryptocurrency like Bitcoin has had many strange side effects. For one, it’s caused the prices of graphics cards to rise. It’s also led to the creation of something called bitcoin mining. If this sounds confusing, that’s because it is.

      The short version: bitcoin is a type of virtual currency that can be mined (or collected) by using some of your computer’s processing power. This is why so many people buy graphics cards to mine it themselves. However, some people have naturally found a way to force other people’s systems to do the job.

      By installing mining software on a device or site, hackers can use that system’s resources to mine for bitcoin. It may not even be that noticeable, since many of these schemes infect thousands of devices and only use a fraction of each system’s resources to stay hidden.

      Protecting your site from this type of malware involves tracking your files to make sure none of them are malicious. You should make sure that you have a Web Application Firewall (WAF) and the ability to scan your site. If your site does get infected, you may need to perform some cleaning.

      4. Spyware

      As the name suggests, spyware is a program that hides on your device and collects information. This makes it one of the most dangerous types of malware as it can be used to gather sensitive data. Common uses for spyware include tracking your keyboard to collect passwords. It can also be used to watch your web activity or private conversations.

      Spyware usually spreads by either using the Trojan horse method of hiding inside other software or by being added to a website. When the latter occurs, the spyware will infect the devices of anybody who visits the site. In 2015, several WordPress sites were compromised in exactly this way.

      An important way to avoid spyware is by making sure every aspect of your site is always updated. This includes your WordPress install, theme, and plugins. You may need to perform these updates manually, but if you’re using managed hosting, your web host will usually take care of this for you.

      5. Adware

      Most of the malware variations we’ve discussed are purposefully designed to remain hidden. However, some take the opposite approach. Such is the case with adware, which forces the user to interact with an advertisement.

      Most of the time, this type of malware is harmless beyond being intentionally irritating. The goal is to make money by getting people to click on banners and links. Adware can also appear as pop-ups you can’t close or that will infinitely reopen until you click on them.

      Related: The Great Pop-Up Debate (and Other Dark UX Problems)

      Once again, the main vulnerability for WordPress users has to do with plugins. This was demonstrated in 2016, when the Simple Share Buttons plugin exposed thousands of users to adware. After an update, the plugin placed a message on the dashboard that you couldn’t remove without clicking on it.

      For this reason, it’s important to continuously scan your files, especially whenever you add or update a plugin. You could also use a tool like Plugin Security Scanner, which checks your theme and plugins daily.

      6. Ransomware

      If adware is the beggar of the malware world, ransomware is the bully. This is another type of malware that doesn’t hide in the shadows but proudly makes its existence known. Ransomware will threaten you with some action or disrupt your system unless you pay to have it removed.

      A common method of extortion is to encrypt your files and make them inaccessible. The attackers will then demand payment if you want to have the files decrypted. However, ransomware can also be used in reverse — to stop attackers from leaking information or damaging your system in some other way.

      Ransomware is often spread via emails, masquerading as attachments that infect the network once opened. It can also be used to target WordPress sites. In these cases, the ransomware typically encrypts each site’s files then tries to make the owner pay to get them back again.

      The best way to thwart these attacks is by keeping regular backups of your site. It’s also important to keep every aspect of your site safe as it could otherwise contain vulnerabilities attackers can take advantage of.

      7. Wiper

      In software terms, the word wipe is rarely attached to good news. As you might suspect, wiper malware is used to destroy the device or network it infects, making it one of the most overtly destructive types of malware.

      Wiper malware is primarily used as a type of cyber warfare. The goal is almost always to attack and destroy, rather than to sneakily use another device for illicit means. One of the most famous examples is the Shamoon attack, which was used to steal files from computers before wiping their storage clean. There’s also the Petya software, which purports to be ransomware, even though it doesn’t actually recover the destroyed files once a payment is made.

      Once again, keeping regular backups is your most important defense. This way, you’ll ensure that your data is recoverable even if your site is hit by a wiper. Avoiding a wiper entirely will require you to use all possible methods of site security. You’ll also want to be prepared to clean up your site if the worst-case scenario comes to pass.

      Related: How to Back up Your WordPress Website — A Complete Guide

      8. Computer Worms

      Computer worms are similar to viruses, with the exception that worms spread autonomously. A virus requires something else to help it move between systems, but worms can work on their own.

      For example, a virus could be triggered when you start an application or insert a disk into your hard drive. Meanwhile, a worm can automatically spread itself, such as through email. In that case, the worm will look at your address book and send itself to all the contacts within. It can then repeat this process more or less forever. In fact, some of the most long-lasting examples of malware are worms, such as the slammer worm, which has been around for more than 15 years.

      Protecting your site against worms is also very similar to securing it against viruses. Consider using a hosting plan that protects against automated attacks.

      9. Botnet

      A botnet isn’t malware in the strictest terms, but it often affects the same sites and exploits similar vulnerabilities. In short, a botnet refers to a network of infected devices that can be controlled from a single point. This network can be used to run tasks or to perform Denial-of-Service (DoS) attacks.

      The botnet works by attempting to insert its code into targeted websites. When a site is successfully infected, it can be used to perform tasks by an external command center. It basically becomes a remote-controlled robot — one that can be used for malicious purposes.

      Many security plugins will protect against injection attacks. This can help prevent your site from becoming part of a botnet. You should also have a means of tracking the activity on your site. This can help you see when injection attacks occur and take measures to fight them before it’s too late.

      How to Protect Your WordPress Site Against Malware

      We’ve already covered numerous ways of protecting your WordPress site against malware. However, keeping your site secure requires a lot of planning, work, and know-how. Fortunately, you don’t have to go it alone.

      Here at DreamHost, we offer tools that can help you safeguard your site. For example, our Malware Remover keeps your site safe from malware by scanning it and removing threats before they can destroy your files.

      The Malware Remover is a powerful tool that will help prevent your WordPress site from falling victim to the malware variations we’ve discussed. Some of its key features include:

      • Automated protection. Malware issues will be dealt with and cleaned up automatically.
      • Weekly website scans. Every file on your site is scanned each week to find any vulnerabilities or possible exploits.
      • Software update notices. We track all updates and inform you when you need to upgrade your software.
      • Whitelisting functionality. You can tailor the system to permit specific processes that the remover perceives as false-positive threats.

      You can add the Malware Remover to your DreamHost account for just a few extra dollars per month. It’s a perfect complement to the standard security features offered by our hosting plans. Your site will thank you!

      Stay Safe Out There

      Malware is an ever-present threat to any website owner; it has been since the dawn of the internet. Plus, it’s something you need to stay vigilant about as new types of malware crop up regularly. Fortunately, keeping your site safe is easier than you might expect.

      Do you have any questions about protecting your WordPress site against malware or how DreamHost can help? Find us on social and let’s start the conversation!





      Source link