Security Disaster recovery myths There are lots of myths surrounding disaster recovery policies, whether you need them and how good they need to be. Here, we’ll discuss some of the biggest misconceptions about... read more
Security Protecting your small business from ransomware If you hear about ransomware attacks in the news, you may believe that they only occur in large companies. But small businesses actually bear the brunt of the attacks, and... read more
Security Are you keeping up with the GDPR? On 25 May 2018, the General Data Protection Regulation (GDPR) began to be enforced across the EU. More than a year on, are companies still complying with its rigorous standards?... read more
Digital How RBLs send spam into a black hole The fight against spam can feel never-ending. Whether it contains potentially dangerous links to scams and malware, or just an avalanche of annoying ads, junk email is never welcome in... read more
Security That escalated quickly: how to prevent privilege escalation Late last year, a major vulnerability was uncovered in the Kubernetes [https://www.fasthosts.co.uk/blog/container-orchestration-kubernetes/] container orchestration system. It was a severe threat, not just because of... read more
Security Malvertising: when ads attack Like it or not, advertising is a fact of life on the internet. As the primary source of income for huge publishers and social media platforms, it can be tough... read more
Servers What is blockchain? The idea of cryptocurrency has been around for a while now but gone are the days of Bitcoin being your only crypto investment option. Since Bitcoin came on the scene,... read more
Security How to upgrade your version of PHP If you’re running websites with an out-of-date version of PHP, we recommend that you upgrade to PHP 8 or beyond. A newer version is more likely to be protected... read more
Cloud Cybersecurity: how does a VPN work? Now more than ever, the internet is playing a key role in every aspect of our lives, both in terms of work and entertainment. And with this increased use comes... read more
Security What the XSS is cross-site scripting? Recently we highlighted the risks posed by SQL injection. The other major type of injection attack is known as cross-site scripting or XSS. To understand cross-site scripting, you have to... read more
Security What is an SQL injection attack? SQL injection involves the insertion of SQL code into a website, commonly through the web browser address bar, or via a login form or search box. The code is then... read more