Ransomware FAQs

As you maybe aware, there is currently a global ransomware cyber attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you get demands for more money. …

What is “Continuous Integration” and why is it used?

Continuous integration or (CI) as it’s often referred to, is a process used to increase the quality of a code, without adding too much extra pressure to the developers responsible for it. Regularly carrying out continuous integration will provide rapid feedback on any issues that have occurred within the code before they get too large, …

Ransomware FAQs

As you maybe aware, the NHS is currently experiencing a ransomware attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you get demands for more money. …

catalyst2 nominated for three awards

The Internet Services Providers’ Association (ISPA UK) has announced the finalists for the 2017 annual awards, the longest running and most prestigious Internet industry awards in the UK. catalyst2, is very proud to have been nominated for three awards including Best Host, Best Business Customer Service and Best Cloud Product. The ISPA Awards is proud to …

One in 5 UK firms were attacked by cyber hackers in 2016

A recent study has found that around 20% of UK firms last year fell victim to some form of cyber attack. The majority of these attacks were targeted at larger companies, which amounted to 42% of UK firms with over 100 employees. On the flip side, only 18% of smaller businesses were targeted, although this …

The future of roaming fees and using your mobile abroad

It is safe to say that mobile phones have become an integral part of our day to day life and the thought of travelling anywhere without the ability to keep up to date with friends and relatives back home and also see what is going on in the news seems absolutely ludicrous. As such it …

What can you do to work “well” at your desk?

You must know the signs. You get up to move around the office and you have to practically “unfold” yourself. Your fingers, shoulders, legs and everything in between feels stiff and you blink like a vampire at dawn. Everyone who works at a computer is guilty of it at some point – working too long, …

The good, the bad, and Let’s Encrypt

We thought it was about time we looked at Let’s Encrypt and tackled some of the questions and concerns surrounding it. We have been quite slow to adopt Let’s Encrypt due to its relative newness, and certain concerns about security and trust signals. Here’s a full explanation of the good and bad where Let’s Encrypt …

What are the most popular new TLDs?

TLD stands for top level domain. Most of us will be well aware of them – you see them all over the internet. They are the prefixes which follow after the dot in all web addresses, so every time you type a URL into your computer or smartphone, you are in fact using a TLD. …

What is HTTP/2?

HTTP has served as the internet’s underlying protocol since its inception in 1991, so why do we need HTTP 2? The answer is simple, HTTP has its limitations. What was fine in 1997 when the current version of HTTP was released, is not sufficiently adaptable for today’s high bandwidth resource intensive web apps. The web …