Development 14 May 2026
FormSubmit is convenient until the spam starts and the ads appear in your notifications. Here is how to replace it with a proper Cloudflare stack that blocks bots, saves every lead to a database, and costs nothing.
CloudflareCloudflare Workers
Security 11 May 2026
Without an SPF record, anyone can spoof your domain and send phishing emails as you. Learn what SPF is, why it matters, and how to set it up in minutes.
Email SecuritySPF
Networking 9 May 2026
A practical case study explaining how a .SE domain disappeared due to a serverHold status, and how DNS, Cloudflare, Hostinger and registrar settings were diagnosed step by step.
DNSCloudflare
Security 4 May 2026
SPF and DKIM check individual emails. DMARC is the policy that enforces what happens when they fail — and most UK businesses don't have one. Here's how to fix that.
Email SecurityDMARC
AI 27 April 2026
ChatGPT, Claude, Gemini, Copilot, Perplexity, Meta AI — there are more AI tools than most businesses know what to do with. Here's a plain-English guide to the main ones, what each is best at, and which might suit your business.
AI modelsChatGPT
Security 27 April 2026
A coordinated campaign of fake negative reviews can reduce a small business's revenue by 25%. Facebook's 3 billion users make it a prime target. Here's a realistic example, how to identify fake reviews, and what your options are.
reputation managementfake reviews
Security 27 April 2026
Without HTTPS, data your visitors submit is sent in plain text. Browsers warn them away, Google penalises you, and you may be breaching UK GDPR. Here's what to do.
HTTPSSSL
Security 20 April 2026
WordPress powers 43% of the web, making its login page one of the most attacked URLs online. Learn why bots target it 24/7 and the eight steps that stop them.
WordPressBrute Force
Cloud 13 April 2026
Moving to the cloud shifts — but doesn't eliminate — your security responsibilities. These are the most common cloud security mistakes W3IT sees in small business environments, and how to fix them.
cloud securitySaaS security
Security 13 April 2026
Your .env file contains database passwords, API keys, and secret tokens. If it is publicly accessible, attackers find it within hours of deployment. Here's how to check.
CredentialsMisconfiguration
Security 6 April 2026
If your web server has a public .git directory, attackers can reconstruct your entire codebase, including hardcoded passwords, API keys, and years of commit history.
GitSource Code
Security 30 March 2026
DKIM adds a cryptographic signature to every email you send. Without it, messages can be altered in transit, and your domain is easier to spoof. Here's how it works.
Email SecurityDKIM
AI 27 March 2026
Claude is Anthropic's AI model — less famous than ChatGPT but often preferred by businesses dealing with complex documents, sensitive communications, and tasks where accuracy and nuance matter. Here's what makes it different.
Claude AIAnthropic
Security 23 March 2026
Even with HTTPS enabled, your site may be vulnerable to SSL stripping attacks on public Wi-Fi. HSTS is a one-line fix that closes the gap — and most sites do not have it.
HSTSHTTPS
Security 16 March 2026
Clickjacking loads your website invisibly inside another page, tricking visitors into clicking buttons they cannot see. One HTTP header stops it entirely. Here is how.
ClickjackingX-Frame-Options
Cloud 9 March 2026
Google and Microsoft tightened email authentication requirements in 2024. Businesses without proper SPF, DKIM, and DMARC records are seeing their emails rejected or filtered. Here's what you need to know and do.
email securityDMARC
Security 9 March 2026
phpMyAdmin is a browser-based database tool that attackers scan for constantly. If it is publicly accessible, your entire database can be exported in minutes.
phpMyAdminDatabase Security
Security 2 March 2026
Your website admin panel is your most sensitive asset online. If it is accessible from any IP address, your password is the only thing standing between you and an attacker.
Admin PanelWeb Security
AI 27 February 2026
While everyone talks about ChatGPT, Perplexity quietly solves one of the biggest problems with AI — hallucinated facts. Here's what Perplexity is, how it works differently, and which businesses get the most value from it.
Perplexity AIAI research
Security 23 February 2026
You have locked down your WordPress login page, but XML-RPC accepts credentials too — and bypasses most login protection plugins. Here is why to disable it.
WordPressXML-RPC
Security 16 February 2026
Browsers try to guess the type of file they are loading — even when told otherwise. This MIME sniffing behaviour can turn innocent-looking uploads into executable attack code.
MIME SniffingWeb Security
Security 9 February 2026
When your web server reveals its software version, attackers can match it against known vulnerabilities in seconds. Here is what server version disclosure is and how to stop it.
Server SecurityInformation Disclosure
Hosting 9 February 2026
Google uses page speed as a ranking factor. Visitors abandon slow sites in seconds. Many small business websites are significantly slower than they need to be — and most owners don't know it.
website performancepage speed
Security 2 February 2026
Missing or misconfigured MX records mean emails to your business vanish without trace. The sender thinks they went through. You never receive them. Here is what to check.
Email SecurityDNS
Security 26 January 2026
Without DNSSEC, attackers can redirect your visitors and intercept your email without touching your server. Here is how DNS spoofing works and what DNSSEC does about it.
DNSSECDNS Security
Security 19 January 2026
Without a CAA record, any of hundreds of SSL certificate authorities can issue a certificate for your domain — giving attackers a legitimate padlock on a fake site.
CAA RecordsSSL Certificate
Cloud 12 January 2026
AWS, Azure, and Google Cloud offer powerful infrastructure — but are they right for small businesses? Here's a clear-eyed guide to when cloud infrastructure makes sense, what it costs, and what to watch out for.
AWScloud infrastructure
Security 12 January 2026
When your domain stops resolving, your website is down and email bounces. Most causes are technical — but sometimes it means your domain has been hijacked. Here is what to check.
DNSDomain Security
Security 5 January 2026
Every minute your website is offline costs money — in lost sales, damaged reputation, and customer trust. Here are the most common causes and how to prevent them.
DowntimeWebsite Availability
Hosting 8 December 2025
Your domain name is the foundation of your business's online identity. Losing control of it — through account compromise, expiry, or hijacking — can take down your website, email, and credibility overnight.
domain securityDNS
Hosting 10 November 2025
Most small businesses treat website hosting as a commodity purchase. It isn't. The hosting decisions you make affect your site's speed, security, reliability, and SEO. Here's what you need to know.
web hostingwebsite performance
Cloud 13 October 2025
Most small businesses believe they have backups. Few have backups that would actually allow them to recover from a serious incident. Here's the difference — and what good cloud backup looks like.
backupcloud backup
Cloud 8 September 2025
Cloud computing is how most businesses now store data, run software, and manage operations. But many SMB owners aren't sure what it actually means or whether they're using it well. Here's a clear explanation.
cloud computingSMB
Security 11 August 2025
Staff working from home, cafés, and co-working spaces significantly expands your attack surface. Most small businesses haven't updated their security practices to reflect this. Here's what's changed.
remote workVPN
Security 14 July 2025
Cyber insurance is increasingly essential for small businesses — but policies vary widely, exclusions are significant, and insurers are tightening requirements. Here's what you need to know before buying.
cyber insurancerisk management
Security 9 June 2025
Billions of username and password combinations from past breaches are freely available to attackers. If your staff reuse passwords across sites — and most do — your business accounts may already be exposed.
passwordscredential theft
Security 12 May 2025
Supply chain attacks generate the highest average insurance claims of any cyber incident. Your business may be fully secured and still get breached — through a supplier. Here's what that means and what to do.
supply chainthird party risk
Security 14 April 2025
When a cyberattack hits, the first 60 minutes determine much of the damage. Most small businesses have no plan for that hour. Here's what a practical incident response plan looks like — and why you need one before you need it.
incident responseransomware
Security 10 March 2025
AI-enabled cyberattacks rose sharply through 2024 and into 2025. The same technology making businesses more efficient is being weaponised to create faster, more convincing, and harder-to-detect attacks. Here's what that means for SMBs.
AI securityphishing
Compliance 10 February 2025
Under GDPR, a data breach must be reported to regulators within 72 hours. Most small businesses don't know this — and don't have the monitoring in place to even know when a breach has occurred.
GDPRdata breach
Security 13 January 2025
MFA prevents 99.9% of automated account attacks according to Microsoft. It takes five minutes to enable. Most small businesses still haven't done it. Here's why it matters and how to start.
MFAmulti-factor authentication
Security 9 December 2024
Most small businesses run a single Wi-Fi network for staff, customers, and business systems alike. This is a significant security mistake — and one that's straightforward to fix.
wifi securitynetwork segmentation
Operations 11 November 2024
Most small businesses underestimate the true cost of technology downtime. It's not just lost sales — it's staff time, customer trust, recovery costs, and reputational damage that lingers long after systems are back online.
downtimebusiness continuity
Security 14 October 2024
Most small business owners have no idea how many devices are connected to their network — or who put them there. This lack of visibility is one of the most exploited weaknesses in SMB security.
network securitydevice management
Security 9 September 2024
67% of all phishing attacks now use AI to generate convincing content. The days of spotting a scam by poor grammar are over. Here's what modern phishing looks like and what to do about it.
phishingAI attacks
Security 12 August 2024
Ransomware attacks now cost SMBs an average of $2.73 million to recover from. 75% of affected businesses cannot continue operating while under attack. Here's what you need to know.
ransomwaremalware
No articles in this category yet. Check back soon.