Repost: How to enable to Two Factor Authentication

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the steps, which will involve scanning …

How We Can Help With Zero-Day Exploits

Cybersecurity has become an increasingly popular topic over the last decade, and there is a good reason to do so, as almost every business or individual has an online presence. In recent years especially, the overall capabilities of hackers have reached new levels, which has led to an increase in different types of exploits and …

The security plugin all Chrome users should install immediately

To mark Safer Internet Day on February 5th 2019, Google released a new password checking plugin for its popular Chrome browser. It might sound boring but it could be vital in alerting you to compromised accounts. The Password Checkup Chrome Extension monitors your credentials, and if you attempt to sign in using compromised data, you …

New sextortion scam danger

The evolution of cyber scams Some cyber scams are quite simple, preying on people’s generosity or their greed. You might receive an email from a foreign prince, who claims he needs to get money out of his country and all he needs is your bank details and he will transfer thousands into your account. Other …

Secure Passwords & 5 Handy Tips

With so many passwords to remember these days it’s a wonder we don’t all lock ourselves out of every website we visit. This handy guide will explain what makes a good password and offer 5 handy tips. Why so many passwords? With over 644 Million websites online today we often visit 20-30 sites every day …

Mutagen Astronomy

What exactly is Mutagen Astronomy?  It is a new vulnerability in the Linux kernel that could see some Linux systems open to attack. Recently picked up by a cybersecurity firm, Mutagen Astronomy is a Linux vulnerability that impacts CentOS and Red Hat Enterprise Linux systems only. Discovered by the research team at Qualys Research Lab, …

Three ways to protect yourself from cryptominers

There has been much in the news lately about cryptomining hacks – that is, a small program being launched that leeches the power of your own CPU in order to mine cryptocurrency for another company – usually the company that installed the program onto your computer in the first place. PirateBay In recent weeks, well-known …

Ransomware FAQs

As you maybe aware, the NHS is currently experiencing a ransomware attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you get demands for more money. …

One in 5 UK firms were attacked by cyber hackers in 2016

A recent study has found that around 20% of UK firms last year fell victim to some form of cyber attack. The majority of these attacks were targeted at larger companies, which amounted to 42% of UK firms with over 100 employees. On the flip side, only 18% of smaller businesses were targeted, although this …

The good, the bad, and Let’s Encrypt

We thought it was about time we looked at Let’s Encrypt and tackled some of the questions and concerns surrounding it. We have been quite slow to adopt Let’s Encrypt due to its relative newness, and certain concerns about security and trust signals. Here’s a full explanation of the good and bad where Let’s Encrypt …