Alexa metrics
Live Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Chat Now
Sarah UKFast | Account Manager

Q3 2020’s most common cyber-attacks explained

16.11.2020 by Yasmin Duggal

View the complete Q3 2020 Threat Report Over the course of Q3 2020, UKFast's Threat Vision platform prevented 8.5 million cyber-attacks from eventualising across our clients’ networks. Using the data collected between July and August, we were able to identify the three most common cyber-attack vectors used by criminals to target UK businesses in the penultimate quarter of the year.    1. CMS login attempts  Number of cyber-attacks detected in Q3:  8.2 million  How does it work?  An attacker uses combinations of usernames and passwords, possibly obtained from a list of stolen credentials or through a phishing campaign targeting employees within your organisation. As the name suggests, the attacker attempts to force…

What is credential stuffing?

13.10.2020 by Laura Valentine

Although it’s been around since at least 2014, credential stuffing is hitting the headlines increasingly more frequently these days. A variation of a brute force attack, this cyber-threat is often financially motivated, although it can also form part of bigger hacks,…

What is an intrusion detection system?

9.9.2020 by Laura Valentine

Navigating the ever-changing cyber-threat landscape is essential for businesses who want to survive in today’s digital world. For organisations looking to ramp up their cybersecurity, the range of options available can often be a source of confusion – what does each solution do, and which is…

EDR vs SIEM: What’s the difference, and which is right for your business?

19.8.2020 by Laura Valentine

With a recent survey revealing that 86% of businesses expect an increase in cyber-threats over the next 12 months, it’s clear that the ever-evolving threat landscape is a major concern for organisations of all sizes. Understanding the distinction between endpoint detection and response (EDR) tools and security information and event management (SIEM) platforms…