Menu

Our Blog

13
May

Ransomware FAQs

Posted by: Jacob in cybersecurity

As you maybe aware, the NHS is currently experiencing a ransomware attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you…

Read More...
05
May

The Internet Services Providers’ Association (ISPA UK) has announced the finalists for the 2017 annual awards, the longest running and most prestigious Internet industry awards in the UK. catalyst2, is very proud to have been nominated for three awards including Best Host, Best Business Customer Service and Best Cloud Product. The…

Read More...

A recent study has found that around 20% of UK firms last year fell victim to some form of cyber attack. The majority of these attacks were targeted at larger companies, which amounted to 42% of UK firms with over 100 employees. On the flip side, only 18% of smaller…

Read More...

It is safe to say that mobile phones have become an integral part of our day to day life and the thought of travelling anywhere without the ability to keep up to date with friends and relatives back home and also see what is going on in the news seems…

Read More...

You must know the signs. You get up to move around the office and you have to practically “unfold” yourself. Your fingers, shoulders, legs and everything in between feels stiff and you blink like a vampire at dawn. Everyone who works at a computer is guilty of it at some…

Read More...

We thought it was about time we looked at Let’s Encrypt and tackled some of the questions and concerns surrounding it. We have been quite slow to adopt Let’s Encrypt due to its relative newness, and certain concerns about security and trust signals. Here’s a full explanation of the good…

Read More...

TLD stands for top level domain. Most of us will be well aware of them – you see them all over the internet. They are the prefixes which follow after the dot in all web addresses, so every time you type a URL into your computer or smartphone, you are…

Read More...
14
Mar

What is HTTP/2?

Posted by: Jacob in software

HTTP has served as the internet’s underlying protocol since its inception in 1991, so why do we need HTTP 2? The answer is simple, HTTP has its limitations. What was fine in 1997 when the current version of HTTP was released, is not sufficiently adaptable for today’s high bandwidth resource…

Read More...

When it comes to e-commerce software, Magento is the most popular one there is. With its popularity, however, comes risks – the biggest one being that it is subject to the largest number of attacks. The attacks are usually carried out by experienced hackers with the aim of getting into…

Read More...

Digital crime and internet fraud is an ever-growing issue in today’s society, becoming a very real threat to the security of individuals as well as corporations and nations. It is more important than ever to be aware of how to keep your online security protected, through making sensible use of…

Read More...
Page 1 of 1512345...10...Last »