Learn how to keep your domain name safe and prevent unauthorized access to it.
Learn more about one of the most common types of spam/scam messages and what you can do to protect yourself.
In our last post about WordPress security, we covered our standard approach to investigating malware. We will now be building on it with our tested steps to secure a compromised account.
An overview of the procedures on researching compromised accounts in use by our Incident Response Team that you can follow yourself.
You may be wondering why the image for this post is a sleeping cat. The answer comes from the cat…
If your website is built with WordPress, you have a huge target on your back, and that’s why we will…
You may have read about the recently discovered security vulnerabilities in two WordPress plugins – YellowPencil Visual Theme Customizer and…
Learn more about Apache’s vulnerability CVE-2019-0211 and why it doesn’t affect ICDSoft customers.
Google started rejecting messages due to failed authentication checks. Read our article for more information and a solution.
Do you really need an SSL certificate? Short answer – yes! Read our post for the long answer…