Security The human aspect of cyber security Attackers are developing bigger, scarier, and more complex viruses every day. Increasingly however, the biggest part of cyber security that businesses should be wary of is the human aspect. Companies... read more
Business Pandemic tips: supercharge your small business during lockdown Since the country slowed to a standstill in March, businesses of all types have been adversely affected and continue to operate under the shadow of the pandemic. Though workers have... read more
Security Cybersecurity for your WordPress plugins: update or else! WordPress is the undisputed king of the CMS realm with a worldwide market share of over 60% [https://www.isitwp.com/popular-cms-market-share/]. With over 450 million websites using it, any... read more
Business The data breach capital of the UK Data breaches are constantly on the rise, and cybersecurity is an ever-evolving battle. In the UK in 2019, almost a third of UK businesses identified cyber security breaches – and it... read more
Security What is a grey hat hacker? Where white hat hackers work alongside organisations and take part in things like bug bounty programs [https://www.fasthosts.co.uk/blog/bug-bounty-programs-and-white-hat-hackers/], there's another type of hacker... read more
Security How to maintain cyber security while remote working Working from home provides a lot of opportunities for flexibility, and can make it easier for a team to balance their home and work life. However, having employees take their... read more
Digital Protect your brand with the right domain names If you’re planning on starting a new online business, you’ll need to build a website, and a buy a domain name. We’ve previously talked about what you... read more
Security How to secure your WordPress site WordPress is the world’s most popular website platform. Providing a solid baseline that can be further enhanced with thousands of community-sourced plugins, it can do almost everything you can... read more
Security The importance of two-factor authentication What is two-factor authentication? Two-factor authentication is a name for any login or entry system which requires two different methods of identifying yourself. It’s one of the most recommended... read more
Security Pros and cons of password managers Even though Face ID and thumbprint scanning is on the rise, passwords are still the primary method of logging in to services, and the number of accounts that the average... read more
Security Disaster recovery myths There are lots of myths surrounding disaster recovery policies, whether you need them and how good they need to be. Here, we’ll discuss some of the biggest misconceptions about... read more
Security Protecting your small business from ransomware If you hear about ransomware attacks in the news, you may believe that they only occur in large companies. But small businesses actually bear the brunt of the attacks, and... read more
Cloud Has your hosting provider got your back(up)? Whether you work with multiple server machines or simply a single laptop, there are many reasons why you should carefully consider what you need in a robust cloud backup solution.... read more