Our blog

Why Advertisers are Abandoning Third Party Cookies

November 2 2018

SHARE ON: linkedin

Last year Apple started blocking third party cookies from Safari, using Intelligent Tracking Prevention (ITP) to block cookies that aren’t first party cookies. But companies like Facebook are fighting back by allowing a first party cookies option for sites using their ad tracker, Facebook Pixel. Google’s also doing this with Google Analytics. What does this […]

PHP Under Attack: New Code Vulnerability

September 14 2018

WordPress security
SHARE ON: linkedin

Do you use PHP for web development? If so, you need to be aware of a vulnerability which has been found in the programming language, and could potentially be used by hackers to enable execution of any command on the web server from a remote device. The hack works by surreptitiously deserializing archived files which […]

Meltdown and Spectre: What You Need to Know

January 8 2018

Meltdown logo
SHARE ON: linkedin

  Virtually every computer, mobile and cloud device is vulnerable to two serious flaws which could allow passwords and other sensitive data to be leaked, according to reports by Google Project Zero, and other independent researchers. This story has caused tremors across the tech world, with people clamouring to find out what the problem is, […]

GDPR: What You Need to Know

November 10 2017

EU Data protection logo
SHARE ON: linkedin

GDPR stands for General Data Protection Regulation, a piece of legislation from the EU which intends to strengthen and unify data protection for all EU citizens. The aim is to give people power over their own personal data, as well as simplify data protection regulation by making it uniform across the whole of the EU. […]

Security Update

April 7 2017

Vector graphic of red circle with white padlock
SHARE ON: linkedin

Security is a continuous concern for the owners of commercial websites. Such websites are public-facing, with a professional reputation and often handle sensitive customer and user information. That’s why we keep ahead of the latest changes to online security and the evolving methods of strengthening security and reducing vulnerabilities. This security update concerns changes to […]

The Guardian’s Journey to HTTPS

February 24 2017

Google start page on browser
SHARE ON: linkedin

The Guardian recently started using HTTPS in their web address, a protocol for secure communication over a computer network. Their stated reasons for the change were privacy and security, improving the site’s SEO, protection of their content and journalistic integrity, the integration of new features and securing of revenue flow. HTTPS works by adding a […]

What is SSL Security?

January 20 2017

Locker keys with security algorithm patterns
SHARE ON: linkedin

SSL Security SSL stands for ‘Secure Sockets Layer’, and is a form of security technology which encrypts information coming into and going out of a website, so that data shared by visitors to the site remains confidential. You can tell if a website is SSL secure by looking at the URL; if it starts with […]

The fifteen keys to WordPress security

January 13 2017

WordPress functions configuration file
SHARE ON: linkedin

Is your WordPress site vulnerable to attacks or viruses? You can never be completely sure, of course, that you aren’t being hacked. That’s the anonymous and unregulated nature of the internet. Whenever you visit a site or give out information online, you’re taking a risk. You can’t be sure that you’re secure online, but you […]


October 28 2016

Vector of Google landing page on browser
SHARE ON: linkedin

What is HTTP/2? It’s a major revision in the HTTP network protocol used by the World Wide Web. It’s a step forward from the SPDY protocol originally developed by Google, and an improvement over HTTP 1.1. It means that new web applications can take advantage of increased speed. While HTTP/2 leaves most of 1.1’s high-level […]


November 17 2015

Anonymous hacker
SHARE ON: linkedin

Hacking can come in many forms, from accessing individual servers to leaking information from the databases of governments and multinational corporations. But, big or small, if a hacker gets through your company’s security system then they can take you down from the inside. This is doubly disastrous because not only will this leave your company […]