New sextortion scam danger

The evolution of cyber scams Some cyber scams are quite simple, preying on people’s generosity or their greed. You might receive an email from a foreign prince, who claims he needs to get money out of his country and all he needs is your bank details and he will transfer thousands into your account. Other …

Secure Passwords & 5 Handy Tips

With so many passwords to remember these days it’s a wonder we don’t all lock ourselves out of every website we visit. This handy guide will explain what makes a good password and offer 5 handy tips. Why so many passwords? With over 644 Million websites online today we often visit 20-30 sites every day …

Mutagen Astronomy

What exactly is Mutagen Astronomy?  It is a new vulnerability in the Linux kernel that could see some Linux systems open to attack. Recently picked up by a cybersecurity firm, Mutagen Astronomy is a Linux vulnerability that impacts CentOS and Red Hat Enterprise Linux systems only. Discovered by the research team at Qualys Research Lab, …

Three ways to protect yourself from cryptominers

There has been much in the news lately about cryptomining hacks – that is, a small program being launched that leeches the power of your own CPU in order to mine cryptocurrency for another company – usually the company that installed the program onto your computer in the first place. PirateBay In recent weeks, well-known …

Ransomware FAQs

As you maybe aware, the NHS is currently experiencing a ransomware attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you get demands for more money. …

One in 5 UK firms were attacked by cyber hackers in 2016

A recent study has found that around 20% of UK firms last year fell victim to some form of cyber attack. The majority of these attacks were targeted at larger companies, which amounted to 42% of UK firms with over 100 employees. On the flip side, only 18% of smaller businesses were targeted, although this …

The good, the bad, and Let’s Encrypt

We thought it was about time we looked at Let’s Encrypt and tackled some of the questions and concerns surrounding it. We have been quite slow to adopt Let’s Encrypt due to its relative newness, and certain concerns about security and trust signals. Here’s a full explanation of the good and bad where Let’s Encrypt …

Two-factor authentication: the lowdown

Digital crime and internet fraud is an ever-growing issue in today’s society, becoming a very real threat to the security of individuals as well as corporations and nations. It is more important than ever to be aware of how to keep your online security protected, through making sensible use of your logins, usernames and passwords. …

How to enable to Two Factor Authentication

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the steps, which will involve scanning …

How to protect yourself against ransomware

From the very time when computers began taking their place in our offices and homes, the computer virus has been around. In the pre-internet days these little pieces of malicious code only really affected the software sharing enthusiast, being relatively difficult to spread in the world of 3.5″ floppy disks. Since the late 1990s, however, …