Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Maximizing Password Security: A Guide for IT Professionals on World Password Day

With every new device, application and website that your users and employees have to log in to, they have to create a new password. It’s no wonder then that they find this overwhelming. So, what do they do? They create a password that is easy to remember — something like “123456” or perhaps their birth date. Then, to keep it simple, they use the same password over and over again. On top of that, they opt for their browsers and devices to remember these passwords.

The Digital Resilience Guide: 7 Steps To Building Digital Resilience

The question is: are you full prepared to adapt to what may come…cyber incident, recession, severe weather? With unexpected events like a global pandemic, businesses see the need to improve their resilience against digital disruptions. That’s because disruption is a certainty — and resilience has a strong ROI. Digital resilience helps businesses respond successfully to these kinds of unexpected events.

Ukraine's Wartime Internet from the Inside

It has now been over a year since Russian forces invaded its neighbor to the west leading to the largest conflict in Europe since World War II. Kentik’s Doug Madory reviews what has happened with internal connectivity within Ukraine over the course of the war in this analysis done for a collaboration with the Wall Street Journal. This February marked a grim milestone in the ongoing war in Ukraine.

5 Ways Nexthink Amplify Strengthens Your Service Desk

What does a normal day look like for your service desk? A flood of incoming tickets. Insufficient data to quickly find the root cause of issues. And a lack of remediation power to close tickets fast. Level 1 (L1) analysts are forced to spend time jumping across tools, reaching out to end users, or relying on guesswork to solve problems.

How I fell in love... with Data Governance (no, really)

If just hearing “Data Governance” fills you with dread, confusion or boredom — then you’re doing it wrong. It’s probably your business’ most undervalued area. And, with the right mindset (plus a read through our new eBook), a good data governance programme can transform your organisational approach to data and unlock its value. Stop looking at data governance as a compliance burden. Reimagine this obligation as a catalyst for change instead.

The 5 Biggest Enterprise Threats to Your Mobile Security and How to Prevent Them

The 5 Biggest Threats: You may have found your business is relying on mobile devices more and more. The computing power of phones and tablets can now equal that of your average desktop computer, but their portability makes them far more useful in a remote working environment. With the number of online communications options available to mobile devices, making a call on a mobile phone is almost an afterthought – but with a cloud business phone system, it is an option that is supported.

Pandora FMS recognized for its excellence in 79 Top 10 reports and 10 G2 grid reports

Here we are again, there you go, efforts and perseverance bear sweet fruit sooner or later. Pandora FMS, leader in monitoring software, does it ring a bell? It has been recognized for its excellence in 79 top 10 reports and 10 G2 reports, one of the main software review platforms in the world.

4 CDN Monitoring Tools to Look At

Beyond their primary function of bringing internet content closer to client servers, CDNs also play a vital role in network security. For instance, CDN helps you absorb traffic overloads from DDoS attacks by distributing traffic across many servers. However, the volume of servers under your CDNs control and their geographically distributed nature presents its own set of risks, operational and security. Choosing the best CDN monitoring tool is critical to the end-user experience.

Building a culture of incident response

At Vanta, our goal is to nurture a positive security culture in everything we do—which is especially critical given that helping our customers improve their security and compliance posture starts with our own. Employees are the key to our security resilience, so we strive to build and support a strong culture of incident response in tandem. Here’s what that means to us at Vanta.

The why and how behind running incident response game days

In any high pressure situation, the key to fast action is preparedness. And that’s true when it comes to incidents, too. Documenting and training your team on your incident response processes is essential to ensuring a coordinated and efficient response effort. And training sessions, or game days, as they’re sometimes called, are one way to get everyone up to speed.