Mindful WordPress Security Practices

Mindful WordPress Security Practices

Secure WordPress Practices With WordPress, one of the easiest tasks to complete is to harden your site but it’s one of the most overlooked tasks! In this day in age with data breaches and hacks running rampant, it’s never too late to implement security practices 

PHP 7 and why you should be using it

PHP 7 and why you should be using it

New and Improved PHP The long-awaited next version of PHP, version 7.0, was released at the end of 2015 and has been since receiving regular updates. With this new version of PHP, amazing speed and new features came along with it. Because it was released 

GDPR: a breakdown and what we’re doing about it

GDPR: a breakdown and what we’re doing about it

What is GDPR? The GDPR (General Data Protection Regulation) compliance deadline of 5/25/2018 is swiftly approaching. If you’re not familiar with GDPR, it’s basically a new/updated set of privacy protection guidelines the EU is requiring for anyone that obtains, stores, or processes personal information about 

Upcoming SSL changes to Google Chrome

Upcoming SSL changes to Google Chrome

New labeling for HTTP sites Starting in July 2018, Google Chrome will be marking all http sites as “Not secure”, something you may have already seen on some sites. When you request a site with http rather than https, your connection is not secure and 

How to Unblock Your IP on a BCH Server

How to Unblock Your IP on a BCH Server

We have some pretty snazzy news to share with you; we’ve added the ability for you to unblock your own IP address from the firewall!  Most of us have at one time or another entered an incorrect password one too many times, or have run afoul 

Password Security Which Will Surprise You

Password Security Which Will Surprise You

For so long, we in the information technology field have been pressing upon our users to maintain “secure” passwords, which included upper- and lowercase letters, punctuation, numbers, and absolutely no dictionary words. This began back in the day when hackers actually had to manually try