Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Get the latest updates, insight, top tips and expert advice  in the cybersecurity world. Working with our sister cybersecurity company Secarma, UKFast works to innovate super-secure products and services to protect your business. Read our range of security blogs, from our ‘top tips to fight the ransomware threat’ to ‘what is SIEM software?’.

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Greene

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown into the mix. This is something that really pains me because they are all very distinct types of assessment. In this article, I’d like to clarify the distinction between the different types of assessments. Setting aside any argument of specific terminology, I aim to explain the different approaches that can be taken and the aims of each – regardless of what…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Greene

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…

Upgrade recommended as Linux sudo vulnerability is discovered

16.10.2019 by Charlotte Greene

An Apple security researcher has discovered a vulnerability in the Linux sudo command – the main command that allows users to run tasks - that could allow unprivileged users to execute commands as root. Before you panic, it’s important to…

What is the zero-trust security model?

9.10.2019 by Charlotte Greene

We’re always looking for ways to make our IT safer and our networks more secure. In this blog, we explore the zero-trust model and why businesses are adopting this to safeguard their networks from attackers and avoid data breaches. What…

Multi-Factor Authentication: Why and How to Use It

8.10.2019 by Charlotte Greene

Multi-factor authentication (MFA) is becoming commonplace within modern workplaces. With a significant rise in the volume and variation of cyber-threats over the past decade or so, and plenty of high-profile security scandals more recently, it’s clear that cybersecurity must be…

Web Application Firewalls: What You Should Know

3.10.2019 by Charlotte Greene

Using a web application firewall (WAF) has become a staple for any organisation conscious about its cybersecurity. And for good reason. The abundance of insecure coding practices creates a wealth of vulnerabilities in the code of web-based apps. Combine this…

How to Defend Against the Most Common Cyber-Threats

2.10.2019 by Charlotte Greene

There are so many different cyber-threats out there. From phishing to DDoS, malware to web-based attacks. But what are the most common cyber-threats you should be focussing on? And what are the most effective methods of protection? The truth is…

Peak Season Reasons to Up Your Security

1.10.2019 by Charlotte Greene

Today marks the beginning of European Cyber Security Month! The first fortnightly theme of 2019 is cyber-hygiene. In other words, exploring practical steps to improve your online security. With Black Friday and Cyber Monday just eight weeks away, this is…

Exim Exploit: What You Need to Know

9.9.2019 by Charlotte Greene

On Wednesday 4th September 2019, Exim maintainers announced that they had received a report of a potential remote exploit in Exim, in versions up to and including 4.92.2. CVE-2019-15846 is the new unauthenticated remote code execution vulnerability in the Exim…

How to Protect from SQL Injection Attacks

3.9.2019 by Charlotte Greene

With so many modern-day applications driven by data and easily accessible via the web, SQL injection vulnerabilities have become widespread and exploited simply by criminals. In the first quarter of 2019 alone, the UKFast Threat Monitoring service detected nearly 30,000…