• Website Development

The Right Decision

IDS develops exclusively on the WordPress platform. With over 75 million websites running on WordPress today, it has proven itself to be a dependable solution. One of the many benefits WordPress offers is its ease of use and flexibility. A great platform for the type of clients that IDS serves.

IDS can develop a site that will effectively communicate your custom design.

With a huge community of developers and users who depend on it, as well as many Fortune 500 companies who trust their websites to WordPress, We believe that it is the most cost-effective, safe and stable platform for you to trust your business too.

Types Of Pages


What goes into developing a website?

Building a website is like building a house. First and foremost you need a plan. For a website to be effective, it has to achieve certain goals. For instance, who is the target audience? What do you want that audience to see? What is the message you want to convey and better yet… how do you want the audience to respond to that message? For a website to function well and produce the results you need it to, you must have a plan that addresses these questions.

Then there is design. How do you want the website to look? What type of customer interaction do you need to have? How will you incorporate your existing branding?

In almost every case, the most important piece of the build is how to manage and promote the site. You need a solid SEO and social media plan in place to get your website noticed and in front of those who need and/or want what you have to offer.

For most, that is where the process ends. At IDS, we have two additional layers to help make your website a better investment in your business.

We include a layer of security in every website we build, which helps keep your website safe against attacks and malicious software (malware and viruses). This offers those viewing your site a safe experience. IDS also offers a maintenance package, which is designed to keep your site updated and backed-up. If anything should go wrong, your site data can be restored with minimal interruption.

Don’t trust your website to just anyone. Let IDS work with you to develop a website that will best suit your business needs and produce the results you need it to. And best of all, work with IDS because their customer service is unrivaled by anyone! We will make you feel like the most important part of the process because after all, YOU ARE!

Some Common Questions

IDS will register a new domain name for any client who has purchased a website package with us. When registering a domain name, IDS will point that domain to one of our high performing VPS servers and manage the domain as part of the website package.

Yes. We provide IMAP email accounts to our clients when they purchase a website package. Additional email accounts can be purchased if more accounts are needed.

Yes, based on the website package that the client chooses, there are several options to choose from.

There is no clear cut price to build a website. That’s because every website is different. At IDS, we take a lot of pride in working with the customer and giving them the best value for their money. We know you work hard for your money and so will we. We will be happy to present a detailed proposal based on the information we collect from you regarding your wants, needs, and expectations of your website.

Check out our pricing overview for a list of our services and the costs associated with them.

We Keep Your Website Safe

  • Website Security

A Line of Defense

At IDS, we believe in creating beautiful websites that are functional and safe. Below, you will see some statistics that relate to cybersecurity. This is why at IDS, we take your website security seriously.

CyberSecurity Statistics for 2019

  • 43% of cyberattacks are aimed at small business
  • 58% of malware attacks are aimed at small business
  • 50% of users said they would click on a link from someone they don’t know
  • In the U.S., a website attack occurs every 39 seconds
  • 28% of adults in the U.S. use the same password for all online accounts
  • The most commonly used password in the U.S. is 123456
  • 90% of hackers use encryption to hide their cyber footprints
  • It takes, on average:
    • 191 days to identify a data breach
    • 66 days to contain a data breach

*cyberSecurity data provided by hostingtribunal.com

Types Of Security



Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Once inside the system, malware can do the following:

  • Blocks access to key components of the network (ransomware)
  • Installs malware or additional harmful software
  • Covertly obtains information by transmitting data from the hard drive (spyware)
  • Disrupts certain components and renders the system inoperable


Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.


Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

1. On unsecured public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.

2. Once the malware has breached a device, an attacker can install software to process all of the victim’s information.


A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.


A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.


A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.

Some Common Questions

Every website proposal we draft includes a security package that the client can accept or decline. If declined, we explain the risks and have the client sign a refusal form which releases IDS from any liability, should the website be compromised.

IDS offers the following forms of security with every website we develop:

  1. Obscurity
  2. Malware
  3. Virus
  4. Firewall

We run a security check on client websites every week. Any software updates that are required are performed at that time.

Typically not. With that being said, because IDS utilizes security software from 3rd party vendors, we can not control any unforeseen charges for software updates/upgrades that may be imposed by the security software developers. We can say that this is not something that is common with the vendor’s IDS chooses to do business with.

We Promote Your Website Online

  • Social Media Management

Humanizing Your Website Through Social Media

“The key is to share, listen, engage, and build relationships.”

Social Media is, without a doubt, the fastest and most cost-effective way to get your message out in front of a large number of viewers. However, to be effective at Social Media, you need a plan, a solid strategy. This is where IDS makes a difference. Over 77% of U.S. Americans now have at least one social media profile. This represents a great opportunity for your business to reach new leads and cultivate new relationships, which will hopefully develop into new business for you.

Some of the biggest benefits to your business using social media are:

  • Reaching large audiences
  • Having a direct connection with your audience
  • Ability to create organic content
  • Access to paid advertising services
  • Building/Expanding your brand
  • Driving traffic to your website
  • Performance evaluation
  • Large scale virtual networking

As with any campaign to promote your business, there is also a level of “bad” that exists. In the “online world” people are less afraid to criticize because people can’t see them. This presents the situation that will require some serious campaign management. A few examples of the negative side of social media are:

  • Your campaign can receive negative feedback
  • Comments and feedback can be embarrassing
  • Management requires a substantial amount of time
  • Results are not immediate

In today’s world of social media, many people believe the idea of “it’s a numbers game” or “throw it all against the wall and let’s see what sticks”. This may be a great way of finding lots of people to follow you, however, at IDS, we don’t believe it is the best way for a business to grow online. Here’s why.

Social media is, evidently, a form of networking. It’s like when you go to a networking meeting. As soon as you walk in everyone starts handing you their business cards. You go home with lots of business cards and you feel pumped up that you have made some connections. Then, when you start looking at all the cards you brought home you realize only 2 or 3 of them have value in what you do. The others belong to businesses that aren’t aligned with what you do, what you offer and there is a greater chance that there will be no business connection between you and them. IDS looks at social media that very same way. We believe that social media needs to be done efficiently and strategically. We work with our clients to establish what their target markets are and create a plan to network, via social media, with those people and businesses that are aligned with the clients vision.