November 2024

Over the weekend, we designed, tested, and implemented new architectural solutions to address recent issues with the central login service for ExchangeDefender products. Additionally, we identified and began resolving a critical alerting issue that had prevented our NOC from receiving timely notifications about service outages.

To expedite improvements, we deployed a web cluster originally planned for a later release. This new cluster introduces advanced high-availability features, including self-healing capabilities and integration with modern, distributed monitoring solutions to ensure consistent global accessibility.

Given the scope of this upgrade, we opted for a phased rollout using A/B testing to ensure service reliability. Over the past three days, we’ve gradually increased traffic to the new cluster, starting at 12%, while monitoring server and load balancer performance metrics. Currently, 20% of traffic is routed through the new cluster, with the remaining 80% handled by the legacy system. In the event of a failure in either cluster, the load balancer will dynamically shift all traffic to the active system, even if a customer was initially pinned to the affected cluster.

Performance Improvements


The initial results have been highly encouraging, with noticeable performance gains. We’ve observed a 5x improvement in P95 latency and a 3x improvement in P99 latency compared to the previous setup.

Next Steps


Next weekend, we plan to implement the final phase of this upgrade, introducing automated transitions between data centers to address any performance or reliability issues proactively.

Addressing Notification System Failures


During our investigation, we identified a failure point in our notification system. Alerts were being throttled or discarded by our SMS gateway, particularly during cascading outages triggered by login server downtime. We’ve since refreshed our monitoring solution with modern analytics tools and implemented multiple alerting pipelines to prevent future disruptions. While we continue to work with our SMS gateway provider to resolve filtering issues, these changes significantly improve our ability to detect and respond to service issues.

Thank You for Your Patience

We sincerely appreciate your understanding as we worked to diagnose and resolve these challenges. We recognize how frustrating the repeated service interruptions have been and want to assure you that we’ve been actively addressing these issues with a focus on long-term reliability and minimal disruption.

Thank you for your continued trust in ExchangeDefender.

Cybersecurity is more important than ever. To protect ourselves online, it’s important to understand key cybersecurity terms. This guide will break down these concepts in simple terms, making them easy to grasp.

Encryption

The process of converting information or data into a code, preventing unauthorized access. It’s like locking a message in a safe, only accessible with the right key.

Firewall

A security system that monitors network traffic and blocks unauthorized access. It’s like a security guard, protecting your digital fortress.

Spyware

Malicious software that secretly tracks your online activity, stealing personal information and compromising your privacy.

Malware

Harmful software designed to damage or disrupt computer systems. It’s like a digital virus that can infect your device.

Smishing

A type of phishing attack that uses text messages to trick people into revealing sensitive information. It’s a sneaky tactic to steal your personal data.

SpearPhishing

A targeted phishing attack that uses personalized messages to deceive specific individuals or organizations. It’s a more sophisticated form of phishing that often mimics legitimate emails.


By understanding these core cybersecurity terms, you can take control of your online security. Remember, a little knowledge can go a long way in protecting yourself from cyber threats. Stay informed, stay safe, and enjoy the digital world with confidence.

What is Ransomware?

Ransomware is a type of Malware. It is a nasty computer virus that locks up your important files. Think of your files as your favorite photos, important documents, or work projects. When ransomware strikes, it scrambles these files, making them useless until you pay the hackers. It’s like a digital thief who kidnaps your data and demands a ransom to give it back.

The Allure of Malicious Links and Attachments

Let’s be real, we’re constantly bombarded with information. From social media to email, we’re exposed to a constant stream of links and attachments. While many of these are harmless, some can be incredibly dangerous.

Why do people click on malicious links and attachments?

  • Curiosity: A well-crafted subject line or intriguing message can pique our interest, leading us to click without thinking.

  • Sense of urgency: Cybercriminals often use tactics like “urgent action required” or “limited-time offer” to create a sense of urgency, prompting us to click impulsively.

  • Trust in the sender: If the email appears to be from a trusted source, such as a friend, family member, or colleague, we may be more likely to let our guard down.

The Devastating Consequences

The consequences of clicking on a malicious link or attachment can be severe. Ransomware attacks can cripple businesses, government agencies, and individuals, leading to significant financial losses, data breaches, and reputational damage.


How to Protect Yourself

To protect yourself from ransomware attacks, it’s essential to practice good cyber hygiene. Here are some tips:

  • Be cautious of unsolicited emails: Avoid opening emails from unknown senders or those with suspicious subject lines.

  • Verify the sender: Double-check the sender’s email address and look for any typos or grammatical errors.

  • Hover over links before clicking: This can help you identify malicious links that may redirect you to harmful websites.

  • Use strong, unique passwords: A strong password can make it more difficult for cybercriminals to access your accounts.

  • Keep your software up-to-date: Regularly update your operating system and software applications to patch vulnerabilities.

  • Back up your data: Regularly back up your important files to an external hard drive or cloud storage service.

By following these simple tips, you can significantly reduce your risk of falling victim to a ransomware attack.

Remember, a single click can have devastating consequences.