Website Security: 5 Tips to keep your web presence secure
Our Top 5 Tips to keep you and your clients secure from hackers.
Secure Email - Part 3: Understanding and using DMARC records
Learn how to implement DMARC records for secure email communication in Part 3 of our series.
Secure Email - Part 2: Understanding and using DKIM records
Learn how to implement DKIM records for secure email communication in Part 2 of our series.
Secure Email - Part 1: Understanding and using SPF records
One common solution is the Sender Policy Framework (SPF), which allows mail servers to verify the authenticity of sender addresses. You can do this yourself by checking the SPF record. How exactly do you do that?
The IT disaster recovery plan
An IT disaster recovery plan offers a blueprint for crucial situations by laying out different approaches to solving problems and appropriately delegating accountability.
10 best practices for creating and securing a strong password
While there is no way to guarantee that your accounts won’t be hacked, one of the best lines of defense is to create stronger passwords.
Get your Website GDPR ready
In this article we provide guidelines on specific steps you can take to move your site toward GDPR compliance.
So what is Lets Encrypt and how does it work.
So lets have a look what is Lets Encrypt and how it works. Let's start with how things are with "normal" SSL certificates.