Free website monitoring-is it worth anything?
Today, we’ll take a look at the ubiquitous offers of free monitoring of the availability of websites. Why are they free, how do they differ from paid services and is it worth using them?
Today, we’ll take a look at the ubiquitous offers of free monitoring of the availability of websites. Why are they free, how do they differ from paid services and is it worth using them?
TLDR; "If you expect to receive important emails from a trusted email address it is worth whitelisting the address to make sure that emails won't be accidentally blocked by an overzealous email client." In this post we show you how to do it in Mozilla Thunderbird by selecting the correct address book settings and adding the email address as a contact in your address book...
SIEM and log management provide security to your organization; these tools allow your security analysts to track events such as potential and successful breaches of your system and react accordingly. Usually, it doesn’t matter how you ensure your organizational safety-as long as you do.
With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted social media platforms were able to monitor our private messages, the choice to share or not to share was taken away from us.
Last week we finished adding more uptime monitoring capacity for our users that are working out of Australia, to provide faster uptime monitoring.
In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.
Retune AB manages a variety of Ubiquiti devices -- wireless data communication products for enterprise and wireless broadband providers. Naturally, we wanted to bring these in under monitoring. However, Ubiquiti does not expose real-time CPU or memory metrics through SNMP in a way that we found reliable and these are some of the key values needed to verify the health of the device.