Menu

Our Blog

Digital crime and internet fraud is an ever-growing issue in today’s society, becoming a very real threat to the security of individuals as well as corporations and nations. It is more important than ever to be aware of how to keep your online security protected, through making sensible use of…

Read More...

Sometimes the support team will ask your for your IP address, by going to http://findip.co . This video shows you how to do it.

Read More...

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the…

Read More...

Around 31st January, the new version of Google Chrome, known as ‘Chrome 56’ was released. The update was created with one main goal in mind – to create warnings for users entering insecure websites. When Google first announced that this update would be occurring, the initial reaction was positive. However,…

Read More...

Voting is a ritual that has remained unchanged for decades. Despite the on-going digitalisation of our lives, it is one of the few systems that has escaped untouched, and every move to modernise it has thus far been met by powerful resistance. A concerned public have cited fears over security…

Read More...

Global satellite internet has long been a dream of those who want a world that offers up true internet equality, and now, thanks to Japanese investment, that likelihood of that dream being fulfilled has taken a giant leap forward. The hugely ambitious plan, which aims to provide everyone across the…

Read More...

Here at catalyst2 nothing is more important to us than you, our customers. We value your opinions, and strive to ensure our already stellar products and services are constantly evolving and improving to serve you even more effectively. To that end, we run an annual survey to gather information on…

Read More...

Do you seem to spend a large portion of your day reading and responding to emails? Or, even worse, waiting for a response to emails you have sent? Then this military technique might be just what you’re looking for! Use these 3 military tips to maximise the efficiency of your…

Read More...

From the very time when computers began taking their place in our offices and homes, the computer virus has been around. In the pre-internet days these little pieces of malicious code only really affected the software sharing enthusiast, being relatively difficult to spread in the world of 3.5″ floppy disks….

Read More...

The internet is a crucial aspect to running your small business, however you may not have taken into consideration the real threats that may be evident through internet usage known as cyber attacking. Understanding cyber security is a must for any small business owner to prevent hackers or scams manipulating…

Read More...
Page 1 of 1412345...10...Last »