Security

5 Affordable Ways To Improve Network Security

5 Affordable Ways To Improve Network Security

Cyberattacks are a real and dangerous threat to businesses of all sizes. Criminals don’t care whether you’re a one-person outfit or a multinational, if you have vulnerabilities, they will seek to exploit them. So, how do you improve security and do it inexpensively? In this post, we’ll look at a range of ways to make …

Are eUKhost GDPR ready?

Are eUKhost GDPR ready?

As you may be aware, the General Data Protection Regulation (GDPR) comes into force on the 25th May 2018. In order to comply with the regulation, we need to make some changes to the way we treat any personal data you may collect, store or process on your hosting plan. We take our obligation under …

15 Things You Need to Know about the General Data Protection Regulation (GDPR)

15 Things You Need to Know about the General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) comes into force on 25th May 2018. Designed to strengthen data protection and privacy for individuals within the European Union, it will have an impact on all organisations that collect data. To make sure you are fully informed about GDPR, here is a list of 15 things every organisation …

5 eCommerce Predictions For 2018

5 eCommerce Predictions For 2018

2018 is with us already and it’s important in the current competitive market that eCommerce businesses don’t stand still. In this post, we’re going to take a close look at five eCommerce predictions for 2018 and explain why online businesses need to take heed of these shifting trends in order to stay ahead of their …

Meltdown and Spectre: New Intel CPU Vulnerabilities Discovered

Meltdown and Spectre: New Intel CPU Vulnerabilities Discovered

Until this week, Spectre was just the fictitious name of a secret organisation bent on world domination in a James Bond movie. Today, it is something far more real, though equally as sinister –a design flaw in Intel microprocessors that leaves any data in their memory vulnerable to malicious exploitation. Intel’s flaw means that applications, …