Blog

Our insights into the latest in web apps, cyber security, experiences implementing the latest technologies, and a few other things that we hope you will find interesting.

Mark Hall
October 09, 2019
Customers expect online systems to be available 24 hours a day, 7 days a week and any downtime is increasingly seen as a failure of the organisation to invest in the necessary equipment and skilled personnel required to achieve this. Even scheduled…Read more
Tim Collingwood
July 18, 2019
A question that we are often asked is ‘What is a web application?’....Read more
Mark Hall
July 03, 2019
The chances are, if your organisation has been in existence for a few years, you will have some legacy systems or applications running somewhere on your network. Although best practice says that you should look to upgrade, migrate or replace older…Read more
Mark Hall
May 23, 2019
For any organisation, the protection of their data and online assets is increasingly important and implementing effective deterrents is essential. Too often organisations only increase their security measures after they have been the victim of a…Read more
Tim Collingwood
April 30, 2019
Organisations are now faced with a multitude of choices when it comes to implementing new applications, whether part of a digital transformation process, or simply replacing existing legacy systems. One of the biggest choices that organisations have…Read more
Mark Hall
April 10, 2019
I was asked recently by someone, who doesn’t work in the technology industry, what exactly is the Cloud? Cloud based applications and Cloud hosting are terms which most people are familiar with and probably use regularly, even if they don’t reali...Read more
Tom Lofts
March 14, 2019
If you’re in the process of building a web application or, thinking about having one built for you, you’re probably aware you need to take security seriously. There is a basic minimum level of security any application should have in place. For ex...Read more
Mark Hall
February 14, 2019
It’s not that long ago when Virtual Private Networks (VPNs) were really only used by businesses and organisations to provide secure remote access to their networks for their users and remote offices. With the increased use of streaming services suc…Read more
Tom Lofts
January 16, 2019
So, you have a web application - when it was first developed, you might have played around with the apps functionality to check it worked (generally known as user acceptance testing) , but you haven’t thought too much about it since then....Read more
Tim Collingwood
January 07, 2019
If 2018 has taught us anything, it’s that keeping your data secure is more important than ever. In the last year we have seen the Facebook/Cambridge Analytica scandal, the Marriott hotel group data breach, the Morrisons employee data breach, and an…Read more
Mark Hall
December 24, 2018
At Oxford Web Applications we frequently get asked how much does it costs to develop an App. In this blog post I will outline the various elements which can affect the overall cost of developing an App and provide some indicative costs based on our…Read more
Mark Hall
December 03, 2018
At Oxford Web Applications we have been developing, supporting and hosting interactive Websites, Applications and Apps for over 23 years. During that time we have successfully launched many projects and we have learnt a lot along the way about some…Read more
Mark Hall
November 14, 2018
This week I watched an interesting programme about the growth in Healthcare services being delivered using Apps and how Artificial Intelligence (AI) can help with the diagnosis of certain diseases. The programme is available for the rest of November…Read more
Tim Collingwood
November 02, 2018
You have probably heard of Secure Sockets Layer or SSL as it’s known in its acronymic form. SSL is essentially what allows websites or web applications to be served on https:// rather than http://. SSL actually has an updated replacement, Transport…Read more
Tom Lofts
October 25, 2018
Back in 2016, Tesco Bank and its customers were victims of an attack where more than 9,000 accounts had money stolen – over £2 million in total. The attack has recently been in the news again after the bank’s security practices were reviewed by ...Read more
Mark Hall
October 04, 2018
The recent news story I read about the Arran Brewery which have experienced a major ransomware attack reminded me of why tape backups are still a vital part of our overall backup strategy....Read more
Tim Collingwood
September 18, 2018
Apple’s recent ‘Gather Round’ event, held on the 12th September 2018, saw the unveiling of it’s latest iPhoneand Apple Watch Series 4. To me, it’s the latter product that stood out in terms of progressive innovation....Read more
Mark Hall
September 04, 2018
From an early age I have been excited by technology. I grew up in the 70’s and early 80’s when personal computers were just emerging and have been lucky enough to have worked in the technology industry for my whole career. As technology has conti...Read more
Tom Lofts
August 22, 2018
When discussing common attacks on web sites and web applications, you may have come across the term SQL Injection, but never been clear about exactly what it means or how it happens. This blog post takes you through the types of vulnerability we…Read more
Tim Collingwood
August 13, 2018
According to reports compiled by SplashData the password ‘123456’ held the top spot for the worst password for 2015, 2016, and 2017. The runner up in the worst password stakes for all three years was ‘password’....Read more