Web Hosting Rumours: Some Much-Needed Clarity

The world of IT is one that is notoriously complex, which goes some-way in explaining why there are few people that truly understand what is going on. Take, for instance, websites – although you might appreciate the need for this, there is a strong likelihood that you are clueless in relation to the way that …

Penetration testing vs vulnerability testing: what’s the difference?

Cyber security is one of the most important factors of security that a company should think about, especially if a lot of their company is conducted on computers. However, how can a company be sure that its technology is secure? There are two main ways that a company can test their cyber security to check …

Everything you need to know about ISO27001 managed servers and hosting

In today’s competitive marketplace for managed servers and hosting, it can be difficult to differentiate between providers and their service offerings. At catalyst2, we mark ourselves out in the managed IT services marketplace by our quality. By quality, we don’t just mean our ISPA awards and nominations, including winning the Best Customer Service Award and …

What is a private cloud?

A virtual private cloud provides a secure environment for a company’s shared resources, accessible only by the business and not from a third party. Businesses may use this for a variety of reasons, such as storing (and sharing) data, hosting websites, or running code. Regardless of how it’s used, using a virtual private cloud server …

What are VPNs and why are they important?

Virtual private networks are essential tools for anyone who values their privacy and security online. Whether you want to prevent your ISP from looking at what you’re doing online or you want to ensure your connection is secure when using public Wi-Fi, VPNs have a lot to offer. What is a VPN? Usually, when a …

We’ve been shortlisted for two awards at the ISPA’s 23rd Annual Awards!

At catalyst2, we’re proud to put our customers and clients at the forefront of everything that we do. Our customer service levels are always a key consideration, regardless of the service we’re providing. As a result of our efforts, we’re proud to announce that we’ve been shortlisted for two awards at the 23rd Annual ISPA …

Encryption at rest: Its purpose and benefits/setbacks

In any organisation, the data held within your system is the most crucial and precious aspect of your business. Whether it be credit card information, transaction histories, or client intel, the data you hold is the core foundation of what your company runs on. This is why it must be safeguarded and protected with the …

What are the CIS Controls?

The CIS controls, previously known as the SANS Critical Security Controls, are a recommended set of actions developed by the Center for Internet Security to enable organisations to thwart the most pervasive cybersecurity threats they are likely to face. The latest version of these controls, version 8, reduces their number from 20 to 18 and …

Everything you need to know about Galera Cluster

Galera Cluster is a synchronous multi-master database cluster developed by Codership of Finland. This open-source software operates as a patch for MySQL and MariaDB and offers its own command-line interface. It provides a range of features including certification-based replication, which uses individual nodes to certify the replicated write set against other write sets. Database reads …