Operations | Monitoring | ITSM | DevOps | Cloud

Mattermost 4.7: Enhanced image preview and thumbnails, faster load times, upgraded desktop app

We’ve just released our February 2018 update and there’s a lot of exciting news to share! Mattermost 4.7 includes enhanced image previews and thumbnails that make it easier to see what’s in the images your colleagues share. We’ve also added several performance improvements. You’ll notice pages and images are loading even faster thanks to image proxy support. It’s also easier to find channels due to optimized autocomplete queries.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.

OnPage turns MSPs into superheroes

At OnPage we know that ConnectWise, and their customers, need to ensure all critical alerts not only reach the right person at the right time, but are also acted upon in a timely manner. The key is providing automatic, intelligent alerting that generates a complete audit trail, while at the same time doing it all seamlessly from within ConnectWise.

OnPage ConnectWise Manage Integration Updates

OnPage - ConnectWise integration helps MSPs streamline incident management, provides higher level of service and faster ticket resolution. IT can concentrate on fixing the issue rather than sending constant updates to customers. With full visibility, customer can see progress right on the ticket. The key is providing automatic, intelligent alerting that generates a complete audit trail tieing to SLA.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.