Security

May
27
Website Security: 5 Tips to keep your web presence secure

Website Security: 5 Tips to keep your web presence secure

Our Top 5 Tips to keep you and your clients secure from hackers.
5 min read
May
13
Secure Email - Part 3: Understanding and using DMARC records

Secure Email - Part 3: Understanding and using DMARC records

Learn how to implement DMARC records for secure email communication in Part 3 of our series.
4 min read
May
10
Secure Email - Part 2: Understanding and using DKIM records

Secure Email - Part 2: Understanding and using DKIM records

Learn how to implement DKIM records for secure email communication in Part 2 of our series.
2 min read
May
09
Secure Email - Part 1: Understanding and using SPF records

Secure Email - Part 1: Understanding and using SPF records

One common solution is the Sender Policy Framework (SPF), which allows mail servers to verify the authenticity of sender addresses. You can do this yourself by checking the SPF record. How exactly do you do that?
4 min read
May
04
The IT disaster recovery plan

The IT disaster recovery plan

An IT disaster recovery plan offers a blueprint for crucial situations by laying out different approaches to solving problems and appropriately delegating accountability.
4 min read
Apr
24
10 best practices for creating and securing a strong password

10 best practices for creating and securing a strong password

While there is no way to guarantee that your accounts won’t be hacked, one of the best lines of defense is to create stronger passwords.
4 min read
Feb
26
Get your Website GDPR ready

Get your Website GDPR ready

In this article we provide guidelines on specific steps you can take to move your site toward GDPR compliance.
5 min read
Jul
09
So what is Lets Encrypt and how does it work.

So what is Lets Encrypt and how does it work.

So lets have a look what is Lets Encrypt and how it works. Let's start with how things are with "normal" SSL certificates.
3 min read