What do I need to do if I own a website as part of my business? Take responsibility for your website – it is your new online shop front.
Continue Reading »Security
Making History with your Out-of-Date WordPress Site
The ‘Panama Papers’ hack has done web developers everywhere a great service. Mossack Fonseca provided a live demonstration of what can happen when businesses ignore the most fundamental and widely […]
Continue Reading »The Perils of Sourcing WordPress Plugins from the Wrong Places
It’s an easy mistake to make. You need a plugin. You Google it, find one, download it and unknowingly install malicious code on your WordPress site. Hackers now have a […]
Continue Reading »Easy Secure Passwords
Internet security is never far from the news these days. In the light of recent high profile security breaches, two pieces of advice come to the fore: use different passwords […]
Continue Reading »What is WordPress?
If you have been browsing the internet lately, chances are you have already encountered WordPress. WordPress is software used to make websites. It powers millions of sites on the web. […]
Continue Reading »Two Factor Authentication for WordPress
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other […]
Continue Reading »WordPress Security: Passwords
Internet security and privacy frequently makes the news these days with big name sites falling prey to hackers. We store more information online than we ever have before and we’re […]
Continue Reading »The 25 Worst Passwords of 2011
Pro tip: choosing “password” as your online password is not a good idea. In fact, unless you’re hoping to be an easy target for hackers, it’s the worst password you can possibly choose.
“Password” ranks first on password management application provider SplashData’s annual list of worst internet passwords, which are ordered by how common they are. (“Passw0rd,” with a numeral zero, isn’t much smarter, ranking 18th on the list.)
Continue Reading »If you do this in an email…
One of the earliest posts I did on this site explained the necessity of using the blind carbon copy (BCC) field on emails that are sent to a whole bunch […]
Continue Reading »