All
jeff

Integrate your network alarms with Microsoft Teams

2020 was a year of incredible change—changes that I believe will have a lasting impact, but also changes that require immense flexibility with traditional...

Why and how to export a violator list for DDoS mitigation

The need to detect and mitigate denial-of-service attacks is nothing new to network and security administrators. DoS attacks on enterprise networks have been occurring...

khalil

Custom script-based sensor for PRTG

Today I would like to explain how to create a custom script that sends specific information to PRTG as a sensor. Customers often ask...

dylan

Should you be monitoring ping?

Ping is one of those protocols that no one thinks about until it isn’t working and you’re trying to quickly troubleshoot connectivity between devices....

stephen

How to improve response time for life-critical network events with Plixer Scrutinizer

The healthcare industry has been on red alert for more than a year now. Workloads have doubled and the amount of time required to...

jim

The harsh truth about the next cyberattack

I don’t know about you, but it seems like there’s news of some big data breach every other month. The hard truth is that...

timm

Monitoring Microsoft Teams traffic with Plixer Scrutinizer

The modern workplace is filled with companies working largely over inter-office messaging systems. These tools often leverage several different functions aside from chatting, such...

joanna

5 ways of verifying security risks and avoiding false positives

I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is...

elgin

How human negligence affects network security

As enterprises adjust to the new normal and remote work, they are bracing for potential attacks resulting from employee carelessness. Bad habits, such as...