How to deal with phishing scams Phishing is a fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details. Here’s how to avoid becoming a victim. Read article
How do I identify Domain Name Scams? There are deceitful companies running domain name scams intended to mislead you. Here is advice on how to identify and deal with some of these domain scams. Read article
How to add DKIM records for mail A DKIM record allows recipient mail servers to check whether an email that is claiming to come from a specific domain, is authorised to be sent. Read article
Why a hacker wants your website Why are small or insignificant websites attacked? Because it contains a collection of resources that hackers can steal or exploit for further attacks. Read article
Do I need domain search registration? Beware of Search registration scams claiming that the visibility of your domain on search engines is at risk and that domain search registration is required. Read article
Mailbox Security Tips Simple ways to protect your mailbox from hackers, including tips on creating strong passwords, and how to check if your mail is secretly being intercepted. Read article
About SSL/TLS & digital certificates SSL/TLS is a technology that creates an encrypted connection between the web server and your visitor’s web browser so that confidential information can be transferred securely. Read article
How to prevent your email being marked as spam Ensure that your email is not inadvertently marked as spam by following our best practice list of words and characters to avoid. Read article
FAQs: Data Protection Compliance We support the new international (GDPR) and local (POPIA) laws regarding data protection as they raise the bar for data protection, security and compliance. Read article
DDoS mitigation A DDoS detection and mitigation system is deployed in both the Cape Town and Samrand data centres. Read article
DKIM records for mail A DKIM record is a DNS record that assists with protecting both email senders and recipients from forged and phishing emails. Read article
Security and Reliability Information regarding the responsible security measures we have in place to protect our customers’ data and intellectual property. Read article
What do I do if my website has been compromised by using my FTP access details? A compromised website is a result of your FTP access details being harvested and then used for spam mailing & the hosting of illegal content. Read article
What are the attacks on the Cloudbric WAF dashboard? Your dashboard displays details of the various attacks to your website blocked by Cloudbric WAF, as well as the number of legitimate visitors. Read article
How to repair a hacked website Sites are most often hacked through vulnerabilities in the website code, compromised Content Management Systems or by accessing the site via FTP. Read article