Online Support

Security

Shopping for a web host? Look for these must-have security features

The Wordfence-WPScan whitepaper is out, shedding light on the state of Wordpress...

Security

Whitepaper: 86 billion WordPress attacks in 6 months

The 2021 Mid-Year WordPress Security Report is now publicly available. The joint...

Security

I don’t store card details, I don’t need PCI!

Why you should secure your data to PCI standards in light of...

Security

Why Does Your Business Need PCI Compliance?

Whether your business is a small start-up or large multi-site corporation, it...

Security

Best Free Security Plugins for WordPress

Wordpress is the most used content management system on the planet. Millions...

Security

You’ve Been Hacked! What Steps Should You Take To Minimise Damage?

It could happen to you. This is true of winning the lottery,...

Security

Tips for Small Business Security

Whether you’re a brand new startup or a mature small business, it...

Security

The GDPR 3 weeks on

GDPR nearly a month on: How has it affected you? The General...

Security

Is your webcam watching you?

Can Your Webcam Be Used To Spy On You? If you’ve ever...

Security

What does Alexa know about you?

What's more fun than having a virtual assistant who can respond to...

Security

What’s the Safest Method of Cyber-communication?

No electronic communication handled by companies can ever be seen as completely...

Security

How to protect your data from disaster and be GDPR compliant

The Data Protection Regulation (GDPR) is coming into force soon and will...

Security

The Cambridge Analytica Scandal and Your Business

Over the past couple of weeks, the hashtag #DeleteFacebook has dominated personal...

Security

What is a BYOD Policy and why is Important to Your Business’s security?

There are many ways that your business’s security can be compromised from...

Security

Secure hosting – why it is so important?

What security measures can your business take to ensure the safety of...

Security

How do you protect your laptop from a malicious attacks, threats and vulnerabilities

Your laptop is vulnerable to different types of attacks.  Sure, you’ve crafted...

Security

Is it a Phishing Email?

Is it a phishing email or a real email? Email is now...

Latest News

Meltdown and Spectre vulnerabilities

You may be aware of the recent reports regarding the Meltdown and...

Cloud Hosting

Steps to Staying Secure Online

Storm Internet offers total security with up-to-date protection and over 45,000 security...

Latest News

Petya/Petwrap Ransomware information

As you may be aware, just under 24 hours ago a further...

Latest News

WannaCrypt Outbreak and How to Stay Safe

Most people nowadays understand not to download suspicious software from obscure websites and...

Security

Zombie and Bot Attacks

Zombie and Bot Attacks What are Zombie and Bot attacks? If a...

Security

Android Devices Vulnerable to Image Hack

Own an Android device? Your phone and your website can be at...

Drupal

Guard your business from three Drupal flaws

Summary: If you have ever dealt with Managed Hosting Services and you run...

Security

WordPress Encryption finally turned on for all websites

Encryption of websites for security is significant in order to prevent them...

Latest News

Is Cybercrime Increasing and what to do to protect your organization?

The Internet is constantly evolving and this presents organizations with the opportunity...

Security

GDPR Post-Brexit. What Now?

We recently posted a blog about the General Data Protection Regulation (GDPR)...

Security

Latest Email Phishing Scam in the Wake of Brexit

It’s been a strange and uncertain time since the EU Referendum results...

Security

Top 10 Tips For Business Security Online

Most small and medium size businesses do not spend much time thinking...

Press Release

What the GDPR Means for Your Business

The European Union has made good on its promise to put rules...

Security

What Can Small and Medium Businesses (SMEs) Do To Protect Their Business?

Small and medium business owners often think cybercrime only happens to bigger...

Security

What is a “Man in the Middle” Attack?

Here we explain one of the hacker's most common tools, which is...

Security

Firewalls and Internet Security: A Short Beginners Guide

In the future, everything will be connected. It won't be just our...

Security

Vulnerability in the design of SSL version 3.0

What is the security problem with SSL 3.0? What is its impact?...

Advice

SSL Certificates: What They Are & Why You Need Them

The open nature of the Internet has enabled social and economic advancement...

Security

PCI Compliance Changes

Version 3.0 of PCI Data Security Standard has been in effect since...

Security

Slowloris outbreak affecting newly updated WordPress sites

Slowloris is one of the worst types of DOS (Denial-of-service) attacks to...

Magento

Critical Flaw in Magento leave Millions of E-Commerce Sites at High Risk

Millions of current online shops are built using Magento. Hackers know this...

Internet

You Are Losing Money by Not Using Two-Factor Authentication

Every major company, from Twitter to Google, Amazon, and Facebook use two-factor...

Latest News

Giving our customers a greater power of control with our new customer portal

Here at Storm Internet we’re dedicated to providing you with the very...

Advice

Yet another web encryption vulnerability identified: LogJam

A new vulnerability known as LogJam has been identified by an international...

0800 817 4727