How to Build an Effective Crisis Communication Plan

Communicating an ongoing crisis is a mammoth task for any business. Even more so in the time of a pandemic like the novel coronavirus. Unless you have a detailed crisis communication plan in place, the lack of clarity and information might put your frontline support reps in a tight spot when they are trying to reassure your customers.


Why cyber security is even more important because of covid-19

Covid-19 is causing myriad challenges for businesses, with remote working, diverted priorities and a general scramble to maintain business-as-usual operations. This is unprecedented in UK industry, and presents a range of challenges and opportunities. In particular, hackers now have more time on their nefarious hands and a whole host of new targets in front of them, in the form of a large number of working-from-home employees.


5 Key Working From Home Tips

The unfolding COVID-19 pandemic has made for a frightening and unnerving start to 2020. Amidst the terrible suffering and pressures on medical systems, people are also being forced to reconsider the simple things of daily life. Quarantining and lockdown restrictions mean that many of us are now having to work from home, every day. Unlike many, I am a twenty-year veteran of working from home.


Remote work: Being productive in a pandemic

With coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are felt in the IT world, too. The lack of a complete work environment, as well as communication issues in development and production, will likely cause a total slowdown in every industry’s growth. Remote work is now mandatory in almost every enterprise.

super monitoring

Top 10 Free Tools to Check Your SSL Certificate Installation

You can utilize an SSL checker to troubleshoot the common SSL errors and vulnerabilities if you have installed an SSL certificate before. There is a plethora of tools you can choose from. You can also use a free SSL checker if you are working on a low budget. And using an SSL checker tool is quite simple. You simply must submit the domain name or IP address and the port number it requires to examine your website’s configuration and security.


How to Build a Customer Lifetime Value Model

We love our customers at Looker. They’ve been essential to helping us improve our product and services, from fixing unexpected bugs to adding new features to better serve their needs. This is also why our amazing support team, also known as the Department of Customer Love, has put customer feedback and relationships first since day one of Looker.


Maintaining Strong B2B Customer Relationships Without Face-to-Face Interaction

In an era where remote work has become commonplace, many customer success managers aren’t too happy. Why? Don’t the enjoy working from their home office? Sure, many professionals do, but their dissatisfaction is because the home office lifestyle inhibits their ability to meet face-to-face with customers. These in person interactions are the foundation of many excellent customer relationships, and it can sometimes be a challenge to build or sustain relationships without them.


An Insider's Look at MISP for Open-Source Threat Intelligence (Video)

Siemplify Technical Account Manager Arnaud Loos builds on his “Open-Source SOC” whiteboard video with a deep dive into the Malware Information Sharing Platform, or MISP, an open-source threat intelligence sharing project that allows for the sharing, storing and correlation of indicators of compromise of targeted attacks.


Does Observability Throw You for a Loop? Part Two: Close with Controllability

In part one, we introduced the duality of observability, controllability. As a reminder, observability is the ability to infer the internal state of a "machine” from externally exposed signals. Controllability is the ability to control input to direct the internal state to the desired outcome. So observability is a loop problem. And we need to stop treating it as the end state of our challenge in delivering performant, quality experiences to our users and customers.


Closer Look: Intelligent Infrastructure Monitoring

In this article: Infrastructure monitoring systems have been undergoing massive change in the past few years. Before the proliferation of cloud computing, IoT and edge computing, mobile apps and SaaS apps, the practice was fairly static, albeit traditionally quite siloed. IT managers needed to get data on a set of standard metrics, from a handful of tools.