Christmas / New Year Support Hours

As we finish hanging the baubles on the tree and prepare ourselves for the inevitable cracker jokes*, we thought we would let you know about our plans for Christmas. Should you have any questions or queries over the festive season, please contact us on: E-mail support – shared@support.catalyst2.com – all the time Phone support – …

How to protect yourself against identity fraud and theft

Your information and identity are extremely valuable to criminals. If they manage to get hold of your personal details such as your address, full name, date of birth, phone number or even your bank account numbers or general credit card details, they may be able to steal your identity. This means a criminal is able …

PHP 7 now support on all Linux Shared Hosting

As of today, we are now supporting PHP 7 on all Linux Shared hosting packages. What are the benefits? The main benefit is that it is faster and will likely make your website perform better. You do need to bear in mind however that if your code is relatively old / the application you are …

Initial Coin Offerings – what are they?

If you’ve heard the term ‘Initial Coin Offerings’ (ICOs) bandied about, you may be wondering what they are. ICOs first appeared in 2013. Since then their number has grown exponentially to in excess of 200, and over $2bn has been invested in them. Examples of ICOs include: • Filecoin: a marketplace for digital storage services …

Blockchain – what is it and why is so important?

Blockchain is something that is starting to garner greater public interest as its applications are becoming more widely recognised and, in many cases, being used today. Many believe it will cause a revolution in the way we carry out all manner of day-to-day tasks and that, in the near future, we will struggle to remember …

Ransomware FAQs

As you maybe aware, there is currently a global ransomware cyber attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you get demands for more money. …

What is “Continuous Integration” and why is it used?

Continuous integration or (CI) as it’s often referred to, is a process used to increase the quality of a code, without adding too much extra pressure to the developers responsible for it. Regularly carrying out continuous integration will provide rapid feedback on any issues that have occurred within the code before they get too large, …

What can you do to work “well” at your desk?

You must know the signs. You get up to move around the office and you have to practically “unfold” yourself. Your fingers, shoulders, legs and everything in between feels stiff and you blink like a vampire at dawn. Everyone who works at a computer is guilty of it at some point – working too long, …

What are the most popular new TLDs?

TLD stands for top level domain. Most of us will be well aware of them – you see them all over the internet. They are the prefixes which follow after the dot in all web addresses, so every time you type a URL into your computer or smartphone, you are in fact using a TLD. …

Securing Magento: what you need to do

When it comes to e-commerce software, Magento is the most popular one there is. With its popularity, however, comes risks – the biggest one being that it is subject to the largest number of attacks. The attacks are usually carried out by experienced hackers with the aim of getting into your store to either spam …