Phishing has become a serious threat lately. Find out how to detect and avoid phishing attacks to protect your personal and financial information.
Learn how to keep your domain name safe and prevent unauthorized access to it.
Learn more about one of the most common types of spam/scam messages and what you can do to protect yourself.
In our last post about WordPress security, we covered our standard approach to investigating malware. We will now be building on it with our tested steps to secure a compromised account.
An overview of the procedures on researching compromised accounts in use by our Incident Response Team that you can follow yourself.
You may be wondering why the image for this post is a sleeping cat. The answer comes from the cat…
Picture this – you’ve invested loads of time, money, and effort into building and developing your website, traffic has started…
You may have read about the recently discovered security vulnerabilities in two WordPress plugins – YellowPencil Visual Theme Customizer and…
Learn more about Apache’s vulnerability CVE-2019-0211 and why it doesn’t affect ICDSoft customers.
Google started rejecting messages due to failed authentication checks. Read our article for more information and a solution.