Skip to content

Blog Posts

August 29, 2019

Despite last year’s Cambridge Analytica scandal, most people continue to use social media at much the same frequency that we did before. Though users are a lot more aware of…

August 27, 2019

The Most Common Web Security Mistakes to Avoid When Developing a Web Application Web application development is a long process that involves creating a user-friendly app from scratch. It’s ultimately…

August 22, 2019

A cloud server runs and works in exactly the same way as a dedicated server with one crucial difference – which is that there is no dedicated physical hardware (however…

August 20, 2019

Content Management Systems (CMS) are commonly used by many businesses to create their own official websites. A popular CMS platform and one of the founders is WordPress. Instead of having…

August 15, 2019

Earlier this week, we posted a blog exploring what DDoS attacks actually are, how they work and why cybercriminals like them so much. Today, we’re going to look a bit…

August 13, 2019

Would you know what to do if your site was hit by a DDoS attack today? To work out a strategy for protecting against DDoS attacks, it’s important to firstly…

August 6, 2019

To put it in it’s most basic terms, a firewall acts like a filter between a computer or network and the internet. It’s a device that monitors incoming and outgoing…

August 1, 2019

Jorn Barger coined the term “weblog” in 1997 and not long afterwards this evolved in to the short form “blog”. The earliest instance of a commercial blog was an ‘Online…