Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Get the latest updates, insight, top tips and expert advice in the cybersecurity world. Read our range of security blogs, from our ‘top tips to fight the ransomware threat’ to ‘what is SIEM software?’.

The key advantages of endpoint detection and response

26.5.2021 by Sophie Cornock

Workplace environments have changed dramatically over the past 12 months, with many personal laptops now doubling as work devices. And, while this may be the height of convenience to you – to a hacker, it’s one more entry point into your business' network. Cyber-threats multiply at a speed of 375 per minute, and every endpoint connected to the internet (such as computers, laptops, mobiles etc.) faces 1.5 attacks per minute. The figures speak for themselves, highlighting the necessity for endpoint detection and response (EDR).  Rather than monitoring the network itself, EDR assesses the endpoints on your system for cyber-threat activity.…

Understanding the evolving cyber-threat landscape

17.5.2021 by Laura Valentine

The cyber-threat landscape is vast, seemingly infinite and ever evolving. In recent times, the methods that hackers use have developed at an abnormal rate. And, while the risk of attack is bad enough, it’s this changing environment that keeps cybersecurity…

What is data encryption at rest? 

14.5.2021 by Laura Valentine

In today’s ever-evolving cyber-threat landscape, data breaches are a constant concern. The exposure of 36 billion records in the first three quarters of 2020 alone, is enough to keep any business owner up at night – regardless of your perceived protection.  Cybercriminals are constantly sizing up routes…

Guest Blog: Sharing the burden of secure remote working

9.4.2021 by Guest

This guest post was authored by UKFast Head of Security and Compliance, Stephen Crow. The rapid shift to home working has left many SMEs at risk of rising security debt. As cybercriminals rushed to take advantage of widening security vulnerabilities,…

3 steps to eliminate security debt and protect remote workers

9.4.2021 by Laura Valentine

Alongside the devastating economic impact of the recent pandemic, hackers have been taking advantage of a predominantly remote workforce, launching more advanced cyberattacks.  In fact, in the UK £6.2 million has been lost to cyber scams in the past 12…

How to stay ahead of DDoS attacks

7.4.2021 by Laura Valentine

In the first half of 2020, Distributed Denial of Service (DDoS) attacks rose by 151% compared to the previous year. Many attacks are grudge motivated and the pandemic's lockdowns gave cybercriminals more time to act out their grievances. DDoS attacks…

The three biggest cloud threats for 2021

25.3.2021 by Laura Valentine

Cloud computing spend increased by a third in 2020. Amazon maintained its majority market share at 31% and enjoyed a 28% growth over the third quarter. Microsoft also benefited, with lockdown placing a high demand on Teams, Windows Virtual Desktop…

Ransomware: What we can learn from the CD Projekt Red hack?

24.2.2021 by Laura Valentine

CD Projekt Red, the studio behind the Cyberpunk 2077 video game, recently fell victim to a targeted cyber-attack. The Polish developer stated that “an unidentified actor gained unauthorised access to our internal network, collected certain data belonging to CD Projekt…

The worst data breaches of 2020

6.1.2021 by Laura Valentine

Last year was a steep learning curve for many businesses, not least of all when it came to cybersecurity. The pandemic caused a surge of cyber-attacks, many of which were targeted at exposing, stealing and/or selling data harvested during a breach of…

Q3 2020’s most common cyber-attacks explained

16.11.2020 by Yasmin Duggal

View the complete Q3 2020 Threat Report Over the course of Q3 2020, UKFast's Threat Vision platform prevented 8.5 million cyber-attacks from eventualising across our clients’ networks. Using the data collected between July and August, we were able to identify the three most common cyber-attack vectors…