Free Virtual Servers Blog Helping you to grow your online presence one blog post at a time

22Mar 18

Easy Internet Solutions acquires CloudMega Limited; Exciting times ahead!

Free Virtual Servers announces the acquisition of CloudMega Limited

March 2018, United Kingdom – Easy Internet Solutions T/A Free Virtual Servers announces the acquisition of CloudMega Limited.

The CloudMega story began nearly 16 years ago, when company co-founder Ian Andrusyk registered the domain name to provide web hosting services. It specialised in enterprise level cloud hosting services, ideal for small-mid sized businesses, and scalable to enterprise level solutions.  

We are happy to welcome the CloudMega customers into the Free Virtual Servers family. We hope you enjoy your stay!


Exciting times ahead, Free Virtual Servers rebrand!

We are also excited to announce that Free Virtual Servers is undergoing a total rebrand.
Our new brand will be called NetNerd, and it is designed to be an easier, and overall smoother experience for our customers. User friendly, easy to use and full of educational information – we hope it will pave a new way into the future.
What do you think of the new brand name? Do you like it? Let us know in the comments.

09Mar 18

How to Stop Receiving Spam Emails – Best Email Security Solutions

Stop spam emails

How to get rid of spam emails?

While technological advancements have opened doors for businesses around the world, there is also a significant downside we sometimes forget: creating dependency.

To exemplify, email is a critical business tool used by corporations around the world and without access to this useful means of communication, productivity and revenue can be negatively influenced.

Bearing this in mind, finding the adequate business email management tool to oversee emails is imperative, as numerous dangers can cause significant headaches – from system downtime and malicious data leaks, to compliance fines and infected computers.

70 percent of emails is a spamWith over 70% of all emails incorporating actual spam and ads and with spam reports on the rise, finding the best email filtering service to block this from happening is a top priority. Additionally, if you don’t have a filtering service, you are potentially open to targeted attacks.

Moreover, even if you make a new email account, this will still not guarantee that you’re safe from threats and spam. So, to help you in your endeavors and guarantee the integrity of your email account, this article will discuss the different types of threats and how they can be stopped.



Whether you’re looking for the best spam filter for email clients like Outlook, Opera Mail, Mozilla Thunderbird, Mailbird Lite we have selected a few enhanced email security services that are bound to give you peace of mind.



FVS Email Gateway Security

FVS Email Gateway Security

If you are looking to block email threats, protect your email address and sensitive information, or merely finding a service to generally block junk email, the FVS Email security maintenance service can efficiently detect suspicious word patterns.

Not only that, but it will also detect Trojans, viruses, phishing emails and even compliance violations concerning data leaks. With this solution, you will finally have an answer to your question: “How to stop junk email?”

The service offered by comprises of seven encryption standards, including TLS, S/MIME, Secure Mail Encryption, OpenPGP, Voltage and PGP Universal.

The combination of these techniques is meant to ensure that messages can be delivered and received securely – in fact, without any end-user action.

Relying on leading global firms such as SpamExperts, you will be able to benefit for more than 99% spam-less accounts and email protection technologies. Featuring secure computing services, the FVS Email Gateway can offer you real-time analysis on more than 1/3 of all the globe’s traffic.

This quick and competent email solution can protect your account from over 99% of all malware.


An alternative to FVS Email Gateway is Proofpoint, an email protection service designed to detect both non-malware and malware threats.

To better put things into perspective, we are discussing BECs, otherwise known as impostor emails, which take the shape of business correspondence.

Behind the service, there is the cloud-based email security, or the option to deploy the security measures on the premises of your business.

It provides granular filtering to control bulk “graymail,” along with any other spam emails which may hinder the overall performance capabilities of your business.

Moreover, Proofpoint can keep email communications flowing between enterprises, regardless of whether the email server fails or not.


Should you be seeking an email spam filtering service capable of protecting both you and other users from cyber-attacks, Symantec might be a great place to start.

Capable of delivering accurate email security that is reliable and tailored to your individual needs, this company prides itself on efficiently protecting users from targeted attacks.

The service makes use of self-learning capabilities, with the system designed to focus on email security. Supporting Microsoft Office 365, Google Apps and other Microsoft services, Symantec is an accurate and dynamic way to prevent the loss of sensitive data.


Cisco Email Security is designed to protect businesses from spoofing, ransomware, email compromise and even phishing.

In fact, by using a multilayered approach and advanced threat intelligence software, Cisco is a valuable service to use when concerned about both inbound and outbound data loses.


Typical Problems




2-4% of emails are malwareAccording to recent reports released by eWeek, approximately 2 to 4% of all emails contain malware issues, a false positive, or spam messages. To better put things into perspective, this means that a staggering 6 million viruses are sent out every single day.

One common malware problem encountered around the globe is ransomware – a type of virus that limits access to your computer, including files, videos and pictures. In turn, you may see that a pop-out will demand payment for the release of certain documents.





Email phishing The concept of phishing involves using psychological manipulation for making users divulge sensitive information, which can then be sold for malicious and criminal activities.

A phishing attack can be typically identified by an authentic-looking email which reports that you need to change passwords to keep your computer safe.

Other phishing techniques involve infected attachments (i.e., a bt phishing email, a fake iTunes email), or links which can procure your personal data.

This may remind you of a scandal involving Apple users from a while back, where Apple fraud email and Apple ID email scam issues were all over the news.

By using particular words or a fake Apple invoice email, cybercriminals gained access to the network and stole a plethora of information from unsuspecting users of the service.


Man-in-the-Middle Attacks


Man in the Middle Attack

Having a secure email or password doesn’t seem to suffice these days. While email encryption adds an additional layer of security, cybercriminals can often insert themselves between the user and the application, service, or even a web link, which the victim is using.

By using this process, your account is merely an email host through which the attacker can impersonate you – reading emails, responding as you would and stealing sensitive information concerning transactions.

Needless to say, without a proper email migration and email filtering service set in place, a spam message, a junk email, or even accidental data leaks can quickly occur. In some cases, this can cause irreparable damage to your business.

Similar to other malicious threats, man-in-the-middle attacks have a high spam capture rate and have been around for many years.

While an unwanted email is easy to avoid, this type of sneaky malware doesn’t require expensive hacking tools, making it widely available for criminals around the world.



Spoofing emails

Due to the fact that email protocols don’t use adequate mechanisms and techniques for detecting and regulating email addresses, hackers can more efficiently use domains and create fake addresses.

Moreover, these are so similar to the legitimate email that it’s hard to identify them with the naked eye. The result of spoofing is deceiving victims into believing that the emails received are from trusted individuals they deal with on a daily basis.

Some even go one step further, spoofing business mailboxes for a similar-looking, fake one (i.e., jbloggs@abccompany vs. jbloggs@abcompany). Thus, you must always check recipient to make sure that you’re emailing the right person.


Spear Phishing


Spear Phishing Attack

According to the SANS Institute, a staggering 95% of all data breaches have one thing in common: spear phishing.

Despite enterprises around the world embracing anti-virus and spam-free services, it still appears that a large number of malware avoid detection from regular spam filters an individual or a firm might set in place.

When it comes to learning more about spear phishing, it’s essential to note that merely a tiny percentage of individuals are targeted. Moreover, a considerable amount of research and effort actually goes into making all emails genuine and legitimate-looking.

But what makes them able to continue down this path is taking advantage of zero-day vulnerabilities, which are not typically detectable using conventional anti-malware tools.

To avoid becoming a victim, an intuitive way is to add security layers – creating a multi-scanning device designed to increase protection against both known and unknown threats.


The answer to the question “How to stop spam emails?” might not appear as simple as it once were. Although these days a big selection of security systems can detect threats to your data and safety, not all of them are created equal.

Today’s advanced email threats have changed, adapting to our ever-evolving technologies and designing advanced email threats that are mainly intended to fool legacy sandboxes, SEGs and other conventional security systems.

In the process of detecting and preventing your personal and work computer from malicious emails, people and organizations must augment their security measures, deploying services capable of performing and delivering accurate, thorough content inspections.

By performing these steps, you will be able to understand the full context of a situation or malware threat, while enabling security analysts to make informed and precise decisions for the sake of your company. Lastly, more than anything, make sure you have a secure email gateway.

24Aug 17

.UK Right of Registration promotion

Nominet (the UK domain registry) has announced that we can register everyone’s reserved .uk domains (you have one reserved for you until 10th June 2019 if you own a qualifying domain) for free. Whilst we have provided an interface in the client area to claim them, many of you have not done so, so we’re going to take the step of registering them all for you from September 11th onwards unless you opt out. A lot of questions can be answered by checking out Nominet’s information site here:

However, we understand you may have further questions about this so here are the most common ones:

Are they really free?
Yes, 100% free, you will not be charged for these registrations at all for the initial 2 year period. After that, standard .uk rates apply, which are the same as

Why is this so important?
Whilst we’ve helped several thousand domain owners claim their domains so far, we envisage a situation in 2019 whereby anyone will be able to register the .uk version of a domain for which you are the or owner. After calling approximately 300 customers by phone to gauge what the preferred course of action is, over 99% wanted the domains registered for them immediately. We’re confident that this applies to the rest of our client base, which is why we’re taking the step of claiming them automatically for you.

As an example of the consequence of not claiming your domain, imagine you own, for example,, and you haven’t claimed your .uk domain by 10th June 2019. On June 11th, your competitor can now register and use, undermining your based website. It’s potentially very bad news.

Do I have to do anything? How do I opt out?
If you’re happy to have them registered for free and added to your account, then do nothing. If you don’t want your free domains, then simply open a ticket through the client area before September 8th, stating which domains you don’t want to claim.

When will they be registered?
We will be registering the domains from September 11th onwards, until October 31st. You will receive a registration confirmation for each domain we register on your behalf, and it’ll appear live in your account instantly, as with any other domain.

Can I transfer domains to you I own elsewhere and then claim the free .uk equivalent?
Yes. Just submit a domain transfer for your qualifying domain in the normal manner at , transfer it to us by changing the IPS tag at the current registrar to EASY-INTERNET. Within 4 hours it’ll show as active in the client area and you can then claim the free .uk version through the client area claim interface.

What are the ongoing costs?
The first 2 years are free, and there’s no obligation to renew, though we expect most will. In an ideal world, .uk wouldn’t exist, but it does, and business owners in particular need to protect their brand names. Auto renew will be enabled by default on these domains.

If you have any further questions, please open a ticket from the client area at

09Feb 16

Safer Internet Day: 7 Tips for Online Security

Safer Internet DayLast year saw a huge surge in the amount of cyber security attacks. High profile data breaches such as the ones suffered by Target and Neiman Marcus’ Computer Systems saw their systems compromised and their business reputation suffered as a result.

Security breaches can be very costly and devastating, so should you be worried about the security of your websites and online accounts? If you hold any kind of database or customer data, you need to take steps to ensure that your systems are secure.  

Read More
04Feb 16

Free SSL Certificates Forever – Protect Your Website And Gain Customer’s Trust

Lets Encrypt LogoWe are delighted to announce the addition of “Let’s Encrypt”, which provides you with the ability to instantly issue trusted SSL certificates for all your hosted domains absolutely FREE!

Read More
26Jan 16

FVS Hosting And Easy Internet Solutions Become Patrons Of The Leicestershire Law Society

We are delighted to announce that we are now Patrons of the Leicestershire Law Society (LLS), an organisation that helps its members by providing support and information on legal matters.  As a Patron we will be offering members of the LLS special offers, promotions and discounts to help with websites, hosting, search engine optimisation and other services to help members get online quickly and easily.

Read More
19Jan 16

4 Reasons Why You’ll Love Using Weebly To Build Your Website

WWeebly Logoeebly powers over 10 million websites across the internet and is loved by people all over the world. It is used by many to create, manage and edit your website and you can use it with any device you have including iPhone, iPad and Android. It has full eCommerce functionality and lets you manage your business from anywhere and stay connected to your audience and customers on the go.

Read More

13Jan 16

We Are Disability Confident: How We Support And Help Disabled People With Entering The Workplace

In the Uwe are disability confidentK over 6 million people of working age are disabled or have a health condition. A large gap between the number of disabled people who are in employment compared with non disabled people exists and the government created the Disability Confident campaign with the aim of halving the employment gap between disabled people and non disabled people.

Through the campaign the government is working with employers to challenge attitudes towards disability, increase understanding of disability, remove barriers and ensure that disabled people have the opportunities to fulfil their potential and realise their aspirations.

Read More