18th May 2016 ● 6 Min. Read
During your busy work day you receive an email with a word document attached, you open it to view the contents and accept the prompt to run macros. The contents of the file will be un-exciting, maybe even blank, but the damage has been done. Allowing the file to open and run its macros has already opened the door for Locky and the quite devastating results of its work.
4th May 2016 ● 6 Min. Read
1. Trust & Security
Web hosting is all about trust in your provider. Can you trust them, not just with your data but with your client’s data also?
Security is important for everyone but it is vital for sites that deal in credit card transactions or collect confidential customer data. The technical challenge of providing a secure hosting environment is a tough one and reputable providers devote a lot of time and effort to securing their systems and keeping them secure against an ever changing threat environment.