Your website is down, you can’t get email, staff and customers are complaining.

You know that a support call is going to cost you money and take a very long time and there is a >50% chance that Fasthosts Technical support will tell you that it’s a known issue, that it was reported on the status page and is now ‘resolved’ so they can’t help you.

Rather than suffer that indignity unknowingly, you decide that before placing that call, you may as well check the fasthosts status page as published on their support site at:  After all, the technical support contact is going to make you feel like an idiot for not looking there first, so why not get it out of the way to begin with.

The problem is, the status page is blank.  There is nothing there, nada, and when we say nothing, we mean nothing – here is the code for the page:

 <!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN”>
<META http-equiv=Content-Type content=”text/html; charset=windows-1252″></HEAD>


So, genuinely nothing.  No information on system status, no history of recent events, not even page formatting.

Don’t bother calling to complain about it, because we have and technical support always seem surprised.  (Two phone calls on the same day a couple of weeks ago and the same contact feigned surprise and said that he didn’t know and had never heard of it being offline)

If Fasthosts can’t keep a simple status page alive and working, what chance have they with your business website?

 Steer clear.


I haven’t heard of anyone who has received their postal password yet.  If you have, please post a comment here so we can guage how many have actually been sent out.

We’ve had quite a few reports of people being given access to their control panel over the phone. 

If you do manage to get through on the phone, insist on identifying yourself for your password.  It is possible for Fasthosts to do this, so crack on.  I’m on hold (again) at the moment.

Two days ago, in an extraordinary attempt to regain control over their security, Fasthosts Internet changed the account passwords for an unknown but significant number of their customers with no prior warning, and 24 hours later without having reported the new passwords to the account holders affected. Read the rest of this entry »