What to look for in next-generation firewalls

Like everything in technology, firewalls – that essential electronic barrier between your computers and the many dangers of the wild cyber-world – are constantly evolving and new versions are being developed all the time, including so-called next-generation editions. Here’s our guide on what to look for in the newest firewalls out there to give you …

Why you should be outsourcing your servers to the cloud

Not yet outsourcing your servers to the cloud? Consider these huge benefits of trusting this essential part of your IT infrastructure to a dedicated, industry-leading organisation. Security Whether cloud-based or not, your systems are vulnerable to internet security breaches. At catalyst2 we have network and server teams constantly managing and maintaining all elements of security and performance …

How will China’s row with Google affect internet security?

China’s relationship with Google has been unstable for a long time, but the poor links between the two have intensified after the technology company said it no longer recognises Chinese certificates of trust on web pages. Google said in an official security blog that the Chinese agency allowed Cairo-based MCS Holdings to issue unauthorised certificates …

The importance of SSL certificates

Secure Sockets Layer (SSL) certificates are the standard technology that is used online to establish an encrypted connection between a server and a web browser. When installed and used on a website it creates a secure connection meaning all of the information and data that passes between the users browser and the server is encrypted. This way …

Internet attacks on the rise – make sure you’re protected

The number of internet security breaches just keeps rising, as criminals seem more determined than ever to break into computers and websites and steal as much information and data – often financial – as they can. This makes it all the more important to ensure you’re fully protected, at all times. In fact, according to …

Improving your online security

We’ve all heard the various horror stories about hacking, phishing and online security gone horribly wrong. Because they are told as “horror stories” we often tend to think of them as being an empty threat rather than something that could really happen. However, consider that recent statistics show that 80% of small businesses have encountered …

GHOST Vulnerability

Over the last few hours there have been reports about the GHOST Vulnerability. This is a vulnerability effecting a core part of the Linux operating system. Patches are being released at the moment and we are currently monitoring the situation and will be applying updates to all servers as soon as they become available. If …

ShellShock Vulnerability

Over the last 24 hours a significant security vulnerability has come to light as part of the Linux Operating System. This vulnerability has been dubbed Shellshock and potentially allows an attacker to gain remote access to systems and execute malicious code. You can see more at: http://www.bbc.co.uk/news/technology-29361794 We wanted to make you aware that we …