Operations | Monitoring | ITSM | DevOps | Cloud

%term

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.

A Crash Course Guide to Cloud Deployment Models 2018

Different cloud environments can prove to be more fruitful for different teams, based on size, budget, or specific needs. A deeper understanding of each cloud deployment model will allow you to make the most informed decision. Get a crash course on hybrid cloud, community cloud, private cloud, and public cloud models.

Reacting to website failure: A foolproof process

Faultless websites, online stores or web apps simply don’t exist. Despite an exemplary infrastructure, duplicated systems and excellent mechanisms, something can always go wrong.We offer you a proven process that you can apply in a crisis situation – adapting it accordingly to your conditions, of course.