Operations | Monitoring | ITSM | DevOps | Cloud

%term

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.

A Crash Course Guide to Cloud Deployment Models 2018

Different cloud environments can prove to be more fruitful for different teams, based on size, budget, or specific needs. A deeper understanding of each cloud deployment model will allow you to make the most informed decision. Get a crash course on hybrid cloud, community cloud, private cloud, and public cloud models.

Reacting to website failure: A foolproof process

Faultless websites, online stores or web apps simply don’t exist. Despite an exemplary infrastructure, duplicated systems and excellent mechanisms, something can always go wrong.We offer you a proven process that you can apply in a crisis situation – adapting it accordingly to your conditions, of course.

Uptime Monitoring Response Timeout Alerts

In the age of the modern website architecture where websites experience little downtime, slow is the new down. A slowdown on a website has been proven to have a negative effect on conversion rates and end user experience. With that in mind, we’ve updated our uptime monitoring to alert you to slow response times.