Articles

Our latest musings covering a wide range of agency related topics and strategy to help push your business forward.

Week 44

What is a CVE?

In previous weeks, we have talked a lot about different security vulnerabilities and linked to their CVE IDs. I realized however, that I have…

November 7, 2024

Open Notebook With Pen And Eyeglasses On Blank Pag 2023 11 27 05 19 55 Utc

Back to School: How to Use Your Expertise to Sell Online Courses

Want to diversify your income? Discover why you should use your expertise to create valuable online courses and how to create and sell courses in no time!…

November 4, 2024

Week 43

What is a CVSS score and how to prioritise WordPress vulnerabilities?

You’ve most likely noticed a CVSS score whenever a security vulnerability has been reported to you. CVSS (Common Vulnerability Scoring System) scores are calculated…

November 1, 2024

Week 42

What is a CSV Injection Vulnerability?

CSV Injection vulnerability is rare and somewhat controversial vulnerability which has been found in less than 100 WordPress plugins over the recent years. In…

October 24, 2024

Week 41

What is an Arbitrary File Upload Vulnerability?

The Arbitrary File Upload vulnerabilities are among some of the most dangerous security flaws in the WordPress ecosystem. These vulnerabilities allow malicious users to…

October 17, 2024

Week 40

What is Privilege Escalation Vulnerability?

Privilege Escalation occurs when a lower-privileged or unauthenticated user can perform an action that escalates their current privilege to a higher level. These vulnerabilities…

October 10, 2024

Pexels Timmossholder 5737622

From Freelancer to Agency Owner: Is It Time to Hire Employees and Build a Team?

Feel like it might be time to hire your first employee but not sure if you’re ready? Learn about when and how to build a team around you in this blog….

October 8, 2024

Week 39

What is a Sensitive Data Exposure Vulnerability?

Imagine that you receive an email from your favorite service provider saying that there was an attempt to access your account. Or a phishing…

October 4, 2024

Vitality Lcp 2

How to Fix Interaction to Next Paint (INP) and Total Blocking Time (TBT) Issues

Learn how to improve INP and TBT to boost your website’s speed with practical tips and strategies….

September 28, 2024

Week 38

What is a Remote Code Execution vulnerability?

The legendary Remote Code Execution is an uncommon but critical security vulnerability that allows an attacker to run arbitrary code or command line commands…

September 26, 2024

The White Speech Bubble Shaped Post It Note On Green Background

The Web Designer’s Guide to Brand Messaging and How to Craft Your Own

Learn the fundamentals of brand messaging and how to craft your own unique messaging framework that connects with your audience and reflects your brand….

September 25, 2024

Depositphotos 182960574 L

Privacy Regulations: How to protect your agency when building websites for clients

Protect your web agency from privacy regulation risks with practical tips on client education, legal documentation, and compliance strategies….

September 23, 2024

Week 37

What is Local File Inclusion Vulnerability?

Local File Inclusion (LFI) is a type of vulnerability in web applications that occurs when an attacker manipulates the application into including files from…

September 20, 2024

Week 36

What is Cross-Site Request Forgery?

Let’s talk about Cross-Site Request Forgery. It’s a common security vulnerability that might have affected your website as well. In fact, according to the…

September 11, 2024

Week 35

What is a Broken Access Control Vulnerability?

This week, let’s dive into broken access control vulnerabilities. It’s probably one of the most self-explanatory vulnerability types, as it arises from—you guessed it—broken…

September 5, 2024

Vitality Lcp 3

How to Fix Website Cumulative Layout Shift (CLS) Issues

Understand Cumulative Layout Shift (CLS), its impact on user experience, and practical tips to measure and improve your website’s performance….

August 30, 2024

Week 34

What is a Cross-Site Scripting (XSS) Vulnerability?

Cross-Site Scripting is one of the most common security vulnerabilities found in WordPress plugins over the years. In 2023, XSS ranked #1 as the…

August 28, 2024

Taxonomy Featured Img

Understanding WordPress Taxonomies

Learn how to create and manage custom taxonomies in WordPress to better organize your content and improve site structure….

August 26, 2024

Week 33

What is an SQL Injection Security Vulnerability?

In our 15th TAB Security Weekly, we explored some of the most dangerous vulnerabilities commonly exploited in WordPress plugins. However, there are many different…

August 22, 2024

Finance Concept 2023 11 27 05 15 46 Utc

6 Ways Creative Outsourcing Can Drive Sales and Boost Profits for Your Agency

Looking for innovative ways to increase sales and boost profit for your digital or creative agency? Here are some expert insights to help guide your journey….

August 20, 2024

Privacy

Common Privacy Misconceptions Amongst Web Designers

Learn why some of the most common arguments about website privacy are just flat-out wrong!…

August 14, 2024

Week 32

WordPress Security Through Obscurity?

Occasionally, we still encounter people who passionately recommend security measures that offer questionable value. Many of these recommendations fall into the category of security…

August 14, 2024

Robot Working With Laptop 2023 11 27 05 31 41 Utc

Spot the Difference: Detecting AI-Generated Content in the Wild

Tired of trying to figure out if content was written by AI or not? Find out how to detect AI-generated content in this blog and whether to trust AI detectors….

August 12, 2024

Week 31

Is Headless WordPress more secure?

Terms like headless architecture, Jamstack, or Composable often pop up during discussions about the future of the web. While those terms differ a bit…

August 7, 2024