Are you following us yet?


Drupal vs WordPress: Planning for Security
By: Ashley Stevens
As we’ve been taught throughout our lives, not everything is a popularity contest. While something may appear bright and shiny on the outside, what’s offered once you’re inside? In a testament to people, we know not to base everything off of ease and appearance, but rather the opposite. The same goes for web development. While there are certain software systems that require a time commitment to get started, the result...
Planning Your Website Architecture
By: Josh Kasombo
When you visit a bad website you can to tell in an instant. Why? Because just like entering a foreign building, when you aren’t able to find where you need to go with ease you get frustrated. Now apply those same principles to your website and you understand the need for having a great website architecture plan!   Users have four questions when they arrive at a website:    Am I in the right place? Do they have what...
Drupal 6 End of Life
By: Lori Highby
Here at Keystone Click we’ve been diehard Drupal fans and advocates since setting up shop in 2008. What that means is we’ve been developing and implementing websites using the Drupal platform dating back to Drupal 6. As the saying goes though, “out with the old, and in with the new”, and Drupal 8 is now the flagship version for users. But as Drupal 8 becomes the new standard, support for the older Drupal 6 will come to...
Useful CSS Fixes Using Flexbox
By: Paul Anderson
Up until now, some of the most frustrating CSS layout issues could only be solved through hacking or unnecessarily tedious processes. Now thanks to the CSS3 Flexible Box layout mode, or "Flexbox", those common layout issues can be solved with ease!    But before you try it for yourself, remember that Flexbox isn't supported on a few browsers (most notably IE9 and earlier), and also many browsers require vendor prefixes...
By: Kevin Ward
Once considered a secure algorithm, SHA-1 has proved to be getting weaker year after year. Search engines, including Google, are finally pushing web users to move on from SHA-1. What Is SHA-1? SHA-1 is the widely used security algorithm that secures sensitive and personal websites, software, and corporate servers. According to, almost 90% of websites that use SSL (Secure Socket Layer) encryptions, such...
Beware of Poodle
By: Jim Jennings
Poodle is the name of a new security vulnerability linked to the SSL (https) protocol (a widely used security measure between two machines operating over the Internet or on an internal network). SSL stands for Secure Socket Layer. Here Is What You Need To Know  In support of legacy browsers, the SSL standard is allowed to 'downgrade' to earlier versions of the protocol. A legacy browser is the previous version of an...
Questions to ask your web developer
By: Lori Highby
Seeking a company to partner with and trust to build your online presence can be nerve-racking and intimidating. The stories flood in over and over again how companies spent a ton of money and hated what they ended up with or even worse generated zero results from the end project. Here are a few questions that are critical to ask your web developer candidates for hire.   1. Can I see your portfolio and call these...