Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Get the latest updates, insight, top tips and expert advice in the cybersecurity world. Read our range of security blogs, from our ‘top tips to fight the ransomware threat’ to ‘what is SIEM software?’.

How secure is the cloud in 2020?

23.9.2020 by Laura Valentine

Despite increasing levels of adoption by organisations of all sizes, cloud solutions continue to be plagued by misconceptions about their security. It’s still commonly assumed that the cloud offers a less secure option compared to on-premises infrastructure. So, how does it really shape up, and what security challenges face the cloud in 2020?  Mythbusting the cloud  While businesses that keep their data on-site often feel as though they have more control over its security, the flaw in that plan is usually a lack of in-house expertise. The cyber-skills gap is widely documented, leaving almost half of UK businesses unable to deal with even basic security tasks. Unless you can afford a dedicated, specialised on-site security team, chances are…

Microsoft Netlogon Vulnerability: How to stay safe

17.9.2020 by Laura Valentine

On Friday 11th August Microsoft announced a phased two-part security update to address a recently identified vulnerability affecting Netlogon. The first stage of the update is underway, with the second phase expected in Q1 2021. Whilst Microsoft has known about the vulnerability since August, a Proof…

Is lockdown helping to bridge the cyber-diversity gap?

11.9.2020 by Yasmin Duggal

On top of the pressing cyber-skills gap across the industry, there is an acknowledged lack of diversity in the UK’s cyber sector. Diversity breeds diversity – and for defence capabilities to continue advancing, it’s crucial the whole sector begins to employ a wider range of people from different backgrounds who can offer new perspectives and diverse skills.   The next generation of cyber professionals  The…

What is an intrusion detection system?

9.9.2020 by Laura Valentine

Navigating the ever-changing cyber-threat landscape is essential for businesses who want to survive in today’s digital world. For organisations looking to ramp up their cybersecurity, the range of options available can often be a source of confusion – what does each solution do, and which is…

Navigating the cyber skills gap in 2020

14.8.2020 by Laura Valentine

While developments in technology are providing highly intelligent, automated solutions and improved security tools, the ever-present cyber skills gap remains a constant issue for businesses across the world. No matter the advancements in automation and security tech, experienced cybersecurity staff remain the best form…

SSL/TLS certificate validity update

13.8.2020 by Laura Valentine

Earlier this year at the CA/Browser forum Spring event, Apple announced that from September 1st the validity period for public SSL/TLS certificates would reduce from 2 years to 398 days. With this sentiment echoed by Google at the CA/Browser Summer event in June, it is…

SIEM technology, GDPR and PCI DSS compliance

12.8.2020 by Laura Valentine

In the two years since GDPR came into effect there have been more than 160,000 reported compliance breaches, resulting in fines totalling over €144 million. Whilst many of these breaches remain the result of human error, cybersecurity has an increasingly important role to play in ensuring customers’ personal information is kept…

What can we learn from the Garmin ransomware attack?

3.8.2020 by Laura Valentine

What a week for Garmin. If you’ve been following the news, you’ll know that on Thursday 23rd July several of its services became unavailable as a result of a rumoured ransomware attack by Russian hackers Evil Corp. Whilst Garmin has been selective in the information it’s shared about the attack, the majority of its platforms and services are…

New DDoS Attack Vectors Identified

27.7.2020 by Laura Valentine

Last week the FBI sent out an alert warning of four new DDoS attack vectors that have been identified. Of these, three have already been exploited, resulting in several large DDoS (Distributed Denial of Service) attacks across the globe.   The four new vectors are:  Constrained Application Protocol (CoAP) …

Smishing: SMS phishing scams explained

25.6.2020 by Laura Valentine

Familiar with phishing? Even if you don’t know the specifics, most of us have experienced it at one point or another – the unexpected email that appears harmless at first but doesn’t seem quite right upon closer inspection. These emails…