Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

What is the Windows ‘PrintNightmare’ bug – and are you at risk?

5.7.2021 by Katie Lander

News has recently broken of a new vulnerability, dubbed ‘PrintNightmare’, that affects any Active Directory-based Windows operating system. This means most Windows-based businesses are now at risk from attack, since the Print Spooler service it affects is turned on by default.  If you’re running Windows in your business, and it’s connected to an Active Directory domain, it’s now vital that you take a few simple steps to keep your technology and data secure. Let’s take a look at the threat in more detail and consider what you need to do to stay protected. What’s PrintNightmare?  Earlier this week, a vulnerability…

The key advantages of endpoint detection and response

26.5.2021 by Sophie Cornock

Workplace environments have changed dramatically over the past 12 months, with many personal laptops now doubling as work devices. And, while this may be the height of convenience to you – to a hacker, it’s one more entry point into…

Understanding the evolving cyber-threat landscape

17.5.2021 by Laura Valentine

The cyber-threat landscape is vast, seemingly infinite and ever evolving. In recent times, the methods that hackers use have developed at an abnormal rate. And, while the risk of attack is bad enough, it’s this changing environment that keeps cybersecurity…

What is data encryption at rest? 

14.5.2021 by Laura Valentine

In today’s ever-evolving cyber-threat landscape, data breaches are a constant concern. The exposure of 36 billion records in the first three quarters of 2020 alone, is enough to keep any business owner up at night – regardless of your perceived protection.  Cybercriminals are constantly sizing up routes…

How secure is your dedicated server?

28.4.2021 by Laura Valentine

Despite the growth of cloud adoption, there remains a time and a place for dedicated servers. In certain circumstances – particularly those associated with legacy applications, demanding performance requirements and extreme data security standards – only physical infrastructure will do.  Whatever your reason for reliance on dedicated…

Guest Blog: Sharing the burden of secure remote working

9.4.2021 by Guest

This guest post was authored by UKFast Head of Security and Compliance, Stephen Crow. The rapid shift to home working has left many SMEs at risk of rising security debt. As cybercriminals rushed to take advantage of widening security vulnerabilities,…

3 steps to eliminate security debt and protect remote workers

9.4.2021 by Laura Valentine

Alongside the devastating economic impact of the recent pandemic, hackers have been taking advantage of a predominantly remote workforce, launching more advanced cyberattacks.  In fact, in the UK £6.2 million has been lost to cyber scams in the past 12…

How to stay ahead of DDoS attacks

7.4.2021 by Laura Valentine

In the first half of 2020, Distributed Denial of Service (DDoS) attacks rose by 151% compared to the previous year. Many attacks are grudge motivated and the pandemic's lockdowns gave cybercriminals more time to act out their grievances. DDoS attacks…

Ransomware: What we can learn from the CD Projekt Red hack?

24.2.2021 by Laura Valentine

CD Projekt Red, the studio behind the Cyberpunk 2077 video game, recently fell victim to a targeted cyber-attack. The Polish developer stated that “an unidentified actor gained unauthorised access to our internal network, collected certain data belonging to CD Projekt…

Compliance and security in the cloud

21.1.2021 by Laura Valentine

Download our Buyer's Guide: Leveraging the Power of the Cloud Despite cloud adoption increasing at a faster pace than ever before, many modern organisations remain concerned about the security of data in the cloud. While cloud security should never be an afterthought, this lingering fear is ungrounded. When it comes to data…