Menu Request FREE Quote
Request FREE Quote

Our Blog

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the…

Read More...

Around 31st January, the new version of Google Chrome, known as ‘Chrome 56’ was released. The update was created with one main goal in mind – to create warnings for users entering insecure websites. When Google first announced that this update would be occurring, the initial reaction was positive. However,…

Read More...

Voting is a ritual that has remained unchanged for decades. Despite the on-going digitalisation of our lives, it is one of the few systems that has escaped untouched, and every move to modernise it has thus far been met by powerful resistance. A concerned public have cited fears over security…

Read More...

Global satellite internet has long been a dream of those who want a world that offers up true internet equality, and now, thanks to Japanese investment, that likelihood of that dream being fulfilled has taken a giant leap forward. The hugely ambitious plan, which aims to provide everyone across the…

Read More...

Here at catalyst2 nothing is more important to us than you, our customers. We value your opinions, and strive to ensure our already stellar products and services are constantly evolving and improving to serve you even more effectively. To that end, we run an annual survey to gather information on…

Read More...

Do you seem to spend a large portion of your day reading and responding to emails? Or, even worse, waiting for a response to emails you have sent? Then this military technique might be just what you’re looking for! Use these 3 military tips to maximise the efficiency of your…

Read More...

From the very time when computers began taking their place in our offices and homes, the computer virus has been around. In the pre-internet days these little pieces of malicious code only really affected the software sharing enthusiast, being relatively difficult to spread in the world of 3.5″ floppy disks….

Read More...

The internet is a crucial aspect to running your small business, however you may not have taken into consideration the real threats that may be evident through internet usage known as cyber attacking. Understanding cyber security is a must for any small business owner to prevent hackers or scams manipulating…

Read More...
12
Dec

One of the security measures on our Linux cPanel servers is that if the server sees a lot of susicious requests from a certain IP address, it will likely block the IP address from the server. This could be due to multiple incorrect logins to cPanel, it could be due…

Read More...

Thank you so much to everyone who filled in our 2016 Annual Survey. We had some great comments and feedback. “Never had a problem in 10 years great service!” “As always another year of outstanding service!!” “The team respond to any question (no matter how silly) very promptly and go…

Read More...
Page 3 of 1612345...10...Last »