New Hosting Packages now available

By | Business, Plesk, WordPress | No Comments

We have launched new hosting packages specifically aimed at designers and agencies.  Our new packages are powered by Plesk Oynx Multi Server and come complete with full management, R1 Backup, 24×7 Support and for WordPress sites a range of premium plugins and services, find out more just click the button below, remember we can also tailor a solution to meet…

Read More

Gzip and caching with Plesk

By | Code Tweaks, IT's not Rocket Science, Optimisation, Plesk, WordPress | No Comments

This quick guide will show you how to quickly and easily make your WordPress site faster with gzip and caching. Let’s take a demo site, testing via GTMetrix shows pretty poor results. Fist things first, we install WP-Rocket, our preferred caching solution, Imagify  to optimise our images. Back to GTMetrix, things have improved but still getting a terrible score…

Read More

Sites migrated for Fluid Web Development

By | Uncategorized | One Comment

The first few WordPress sites for Fluid Web Development have been migrated and optimised.  All are running on our Plesk Oynx servers with PHP 7.1, HTTP/2, WordPress 4.7.2.  All the plugins have been updated and they are all protected with SSL.  Now with our full management service these sites will always be up to date.…

Read More

Update to WordPress 4.7.2 – Now

By | Business, IT's not Rocket Science, Security, WordPress | No Comments

If you have not updated your WordPress installations to WordPress 4.7.2, you need to do so now. Three security vulnerabilities were highlighted in the release notes last week, see WordPress 4.7.2 security release however another critical security fix was disclosed yesterday, see disclosure of additional security fix in WordPress 4.7.2. In this security disclosure, an Unauthenticated Privilege Escalation Vulnerability in a REST API Endpointvulnerability was disclosed…

Read More

How to secure SSH

By | IT's not Rocket Science, Plesk, Security | No Comments

SSH provides remote access to the command line interface of your server.  Via this interface you have full control over your server the services and sites hosted on it.  If a hacker gets access to your server via ssh then they have full control – it needs to be secured. There are several ways that ssh access can be secured.  This…

Read More

Pin It on Pinterest