Repost: How to enable to Two Factor Authentication

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the steps, which will involve scanning …

Penetration testing vs vulnerability testing: what’s the difference?

Cyber security is one of the most important factors of security that a company should think about, especially if a lot of their company is conducted on computers. However, how can a company be sure that its technology is secure? There are two main ways that a company can test their cyber security to check …

Everything you need to know about ISO27001 managed servers and hosting

In today’s competitive marketplace for managed servers and hosting, it can be difficult to differentiate between providers and their service offerings. At catalyst2, we mark ourselves out in the managed IT services marketplace by our quality. By quality, we don’t just mean our ISPA awards and nominations, including winning the Best Customer Service Award and …

What is a private cloud?

A virtual private cloud provides a secure environment for a company’s shared resources, accessible only by the business and not from a third party. Businesses may use this for a variety of reasons, such as storing (and sharing) data, hosting websites, or running code. Regardless of how it’s used, using a virtual private cloud server …

What are VPNs and why are they important?

Virtual private networks are essential tools for anyone who values their privacy and security online. Whether you want to prevent your ISP from looking at what you’re doing online or you want to ensure your connection is secure when using public Wi-Fi, VPNs have a lot to offer. What is a VPN? Usually, when a …

We’ve been shortlisted for two awards at the ISPA’s 23rd Annual Awards!

At catalyst2, we’re proud to put our customers and clients at the forefront of everything that we do. Our customer service levels are always a key consideration, regardless of the service we’re providing. As a result of our efforts, we’re proud to announce that we’ve been shortlisted for two awards at the 23rd Annual ISPA …

Encryption at rest: Its purpose and benefits/setbacks

In any organisation, the data held within your system is the most crucial and precious aspect of your business. Whether it be credit card information, transaction histories, or client intel, the data you hold is the core foundation of what your company runs on. This is why it must be safeguarded and protected with the …

What are the CIS Controls?

The CIS controls, previously known as the SANS Critical Security Controls, are a recommended set of actions developed by the Center for Internet Security to enable organisations to thwart the most pervasive cybersecurity threats they are likely to face. The latest version of these controls, version 8, reduces their number from 20 to 18 and …

Everything you need to know about Galera Cluster

Galera Cluster is a synchronous multi-master database cluster developed by Codership of Finland. This open-source software operates as a patch for MySQL and MariaDB and offers its own command-line interface. It provides a range of features including certification-based replication, which uses individual nodes to certify the replicated write set against other write sets. Database reads …

What are the benefits of infrastructure-as-a-service for businesses?

The proliferation of on-demand cloud services represents one of the most significant technological advances of recent times. Businesses and organisations can now access highly specialised software and hardware remotely while paying a recurring subscription fee that is a fraction of the cost of bringing that same infrastructure in-house. Infrastructure as a service is a hot …