Security The human aspect of cyber security Attackers are developing bigger, scarier, and more complex viruses every day. Increasingly however, the biggest part of cyber security that businesses should be wary of is the human aspect. Companies... read more
Security WordPress plugin security: How to secure WordPress plugins WordPress is the undisputed king of the content management system (CMS) realm, powering 43.3% of the web as of 2024. With over 835 million websites using WordPress, any dangerous... read more
Security What is a grey hat hacker? Where white hat hackers work alongside organisations and take part in things like bug bounty programs [https://www.fasthosts.co.uk/blog/bug-bounty-programs-and-white-hat-hackers/], there's another type of hacker... read more
Security How to maintain cyber security while remote working Working from home provides a lot of opportunities for flexibility, and can make it easier for a team to balance their home and work life. However, having employees take their... read more
Digital Protect your brand with the right domain names If you’re planning on starting a new online business, you’ll need to build a website, and a buy a domain name. We’ve previously talked about what you... read more
Security How to secure your WordPress site WordPress is the world’s most popular website platform. Providing a solid baseline that can be further enhanced with thousands of community-sourced plugins, it can do almost everything you can... read more
Security The importance of two-factor authentication While a strong password can help keep your account safe, it’s not a means to an end. With two-factor authentication, you can add an extra layer of security to... read more
Security Pros and cons of password managers Even though Face ID and thumbprint scanning is on the rise, passwords are still the primary method of logging in to services, and the number of accounts that the average... read more
Security Disaster recovery myths There are lots of myths surrounding disaster recovery policies, whether you need them and how good they need to be. Here, we’ll discuss some of the biggest misconceptions about... read more
Security Protecting your small business from ransomware If you hear about ransomware attacks in the news, you may believe that they only occur in large companies. But small businesses actually bear the brunt of the attacks, and... read more
Security Are you keeping up with the GDPR? On 25 May 2018, the General Data Protection Regulation (GDPR) began to be enforced across the EU. More than a year on, are companies still complying with its rigorous standards?... read more
Digital How RBLs send spam into a black hole The fight against spam can feel never-ending. Whether it contains potentially dangerous links to scams and malware, or just an avalanche of annoying ads, junk email is never welcome in... read more
Security That escalated quickly: how to prevent privilege escalation Late last year, a major vulnerability was uncovered in the Kubernetes [https://www.fasthosts.co.uk/blog/container-orchestration-kubernetes/] container orchestration system. It was a severe threat, not just because of... read more