Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Strengthen Your Cloud Security in 5 Steps

27.2.2020 by Charlotte Greene

Migrating your workloads to the cloud is a process filled with opportunity for business growth. However, whether your business flourishes in the cloud is not just down to what platform you choose or how much you spend, but how much attention you pay to your security. With 90% of companies now reportedly ‘in the cloud’, threat actors have an unprecedented number of endpoints to sink their cyber-teeth into. Studies show that nearly two thirds of organisations view security as their biggest cloud challenge. Bitglass’ 2019 Cloud Security Report states that ‘93 percent of respondents are at least moderately concerned about…

4 Lessons from the Travelex Ransomware Attack

5.2.2020 by Charlotte Greene

Foreign currency and travel money service Travelex was attacked with ransomware on 31st December 2019. The attack rendered the Travelex website unavailable for the entirety of January 2020 and had a significant impact on the company’s wider operations – with…

Most Common Cyber-Attacks of 2019 Explained

8.1.2020 by Charlotte Greene

Over the course of 2019, UKFast’s Threat Monitoring service detected and responded to more than 33 million cyber-attacks across our clients’ networks. Using this wealth of data, we were able to identify the four most common cyber-attack vectors used by…

Intel Vulnerability: Intel’s ‘New Zombieload Flaw’

12.11.2019 by Charlotte Greene

On 12th November 2019, Intel® disclosed a potential security vulnerability which affects a number of Intel® Processors. The hardware flaw affects server memory and may allow for unexpected reloads of a device (DoS attack) if unmitigated. What is the new…

The 7 Worst Hacks and Breaches of All Time

5.11.2019 by Charlotte Greene

From global breaches exposing the personal data of millions, to employee slip ups jeopardising entire business networks, hacks and breaches have become a staple of our lives. But what are the worst hacks and breaches of all time? Well, we…

White Hat Hackers: The inside story

30.10.2019 by Charlotte Greene

Often stereotyped as dubious, hooded characters hunched over keyboards in dank basements, hackers historically have had a pretty bad rep. But with every good villain comes a hero. In this case, the white hat hackers using their skills as a…

Vulnerability Scanning vs Penetration Testing

23.10.2019 by Charlotte Greene

This Vulnerability Scanning vs Penetration Testing guest blog is authored by Holly Williams, Technical Director of cybersecurity firm Secarma. * I occasionally see the terms vulnerability assessment and penetration test used interchangeably, or even phrases such as ‘automated penetration test’ thrown…

Automated Cyber-Attacks Are Coming For Us

17.10.2019 by Charlotte Greene

It’s no secret that cyber-attacks are becoming more automated and intelligent by the day. With the help of AI and machine learning (ML), hackers are able to act faster and more efficiently than ever. But what is this new wave…

Upgrade recommended as Linux sudo vulnerability is discovered

16.10.2019 by Charlotte Greene

An Apple security researcher has discovered a vulnerability in the Linux sudo command – the main command that allows users to run tasks - that could allow unprivileged users to execute commands as root. Before you panic, it’s important to…

What is the zero-trust security model?

9.10.2019 by Charlotte Greene

We’re always looking for ways to make our IT safer and our networks more secure. In this blog, we explore the zero-trust model and why businesses are adopting this to safeguard their networks from attackers and avoid data breaches. What…