Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Nuttall

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown…

Q&A with UK Business Angels Association

21.10.2019 by Charlotte Nuttall

Jenny Tooth OBE is the CEO of the UK Business Angels Association – the trade body for angel and early stage investing, representing more than 15,000 investors around the UK. Jenny has over 20 years’ experience of facilitating SMEs access…

eCommerce Guest Blog: Get Ready for the Internet’s Peak Season

21.10.2019 by Charlotte Nuttall

Mark Blackhurst, Co-Founder of Digital Next, shares his behind-the-scenes tips and tricks as the eCommerce peak season creeps closer. As any experienced sales or marketing professional knows all too well, eCommerce companies need to prepare meticulously for the weeks leading…

Six Key Takeaways from eCommerce Live UK 2019

18.10.2019 by Charlotte Nuttall

"eCommerce is disrupting traditional retail on a huge scale - and no business will escape that disruption." That's how Brian McBride, former ASOS chairman and CEO of Amazon.co.uk, kicked off eCommerce Live UK 2019. And it certainly set the tone…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Nuttall

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…

Upgrade recommended as Linux sudo vulnerability is discovered

16.10.2019 by Charlotte Nuttall

An Apple security researcher has discovered a vulnerability in the Linux sudo command – the main command that allows users to run tasks - that could allow unprivileged users to execute commands as root. Before you panic, it’s important to…

What is the zero-trust security model?

9.10.2019 by Charlotte Nuttall

We’re always looking for ways to make our IT safer and our networks more secure. In this blog, we explore the zero-trust model and why businesses are adopting this to safeguard their networks from attackers and avoid data breaches. What…

Multi-Factor Authentication: Why and How to Use It

8.10.2019 by Charlotte Nuttall

Multi-factor authentication (MFA) is becoming commonplace within modern workplaces. With a significant rise in the volume and variation of cyber-threats over the past decade or so, and plenty of high-profile security scandals more recently, it’s clear that cybersecurity must be…

Web Application Firewalls: What You Should Know

3.10.2019 by Charlotte Nuttall

Using a web application firewall (WAF) has become a staple for any organisation conscious about its cybersecurity. And for good reason. The abundance of insecure coding practices creates a wealth of vulnerabilities in the code of web-based apps. Combine this…

How to Defend Against the Most Common Cyber-Threats

2.10.2019 by Charlotte Nuttall

There are so many different cyber-threats out there. From phishing to DDoS, malware to web-based attacks. But what are the most common cyber-threats you should be focussing on? And what are the most effective methods of protection? The truth is…