Is Password Management Software Really That Secure?

At this point there doesn’t seem to be any question that virtually any network, server, or website can be hacked. After all, if hackers can breach corporate entities, health insurance providers, and even the government, what’s to stop them from hacking your business?

In some ways, small and mid-size businesses are lucky – they don’t have the same target on their backs that larger competitors do. Unfortunately, many smaller businesses are also forced to compromise when it comes to security due to a limited budget. Even though you may not face the same threats as better-known entities, you might be at greater risk.

In order to protect yourself, you need to make sure the components of your security system are up to the task. While password management software is certainly handy in this day and age, what with the onus to create unique passwords for every online account, you need to know if it’s safe to use. How secure is it?

Password management software has become a popular option for anyone looking to cut back on the amount of time spent trying to remember usernames and passwords for their many online accounts. With this type of program, all you have to do is log in to one master account, remember just one set of login information, and you can access every online account, despite the fact that they all have unique username and password combinations.

This is handy for business owners and clients alike, but it may not be entirely safe. If someone is able to hack the master password, they could immediately gain access to absolutely every account, putting your identity and the identities of others at risk. It seems like a pretty big risk, but if you rely on such a program to manage your passwords, don’t despair. They’ve taken steps to ensure the safety of their users.

Just look at the hack of popular password management company LastPass a few months ago. Users were terrified to discover that the site had been hacked, compromising email addresses, passwords, password hints, and other information related to the security of user accounts. LastPass, however, seemed unconcerned with the breach.

Although hackers accessed security data, the company claimed that user identities were not actually compromised, per se. This, they claimed, was because they had taken aggressive steps to protect their data, so that even if it was stolen, it could never be accessed. LastPass stated that their encryption was so robust that even if hackers stole their user data, there was no chance they would be able to crack it. The only chance that information could be accessed would be due to the user error of creating too simple a password.

In light of the breach, the company asked users to change their password information. The situation raised an interesting point, though. Are services for password management secure enough that you would trust your personal data (or client information) to them? If LastPass and others are to be believed, their software is more secure than what the average person could come up with alone. Their stance seems to be that breaches are bound to occur – and they’re ready.

Many such companies do not store user information on their own servers, so even if breaches occur, there is little chance data will be stolen. In addition, the level of encryption used to secure sensitive data is so high that even the best hackers will be stymied should they manage to steal anything. All users have to do is create a master password complex enough that hackers won’t figure it out – so don’t use your birth date or the name of your first pet.

In truth, using a password manager is likely much safer than going the other route and trying to remember a laundry list of unique username and password combinations for every online account. For one thing, you can’t store them all in your head. This means you’re likely to write them down, store them in your phone, or otherwise allow for easy access.

With password management software you need only create and memorize one strong password in order to protect all of your online accounts. If it is discovered, you will definitely be in trouble, but if you use it appropriately, the odds of failure are much smaller than the alternative. This means greater protection for your own online accounts, and potentially the accounts of other users, as well.

What Can You Learn From the Latest Starwood Hotels Data Breach?

Data breaches are a dime a dozen these days. You can’t open a paper or check a newsfeed without coming across some kind of scandal involving a hack in which sensitive user data was stolen. In the last year alone, mega corporations, banks, health insurance providers, and government entities have all been breached by hackers, malware, or other online threats. The climate has become one of “if, not when” a hack will occur, and no one is entirely safe.

The most recent data breach to make headlines involved upscale hotel chain Starwood Hotels, a company that includes Sheraton, Westin, W Hotels, and other luxury brands. Starwood isn’t even the only hotel chain to be hacked this year – both the Mandarin Oriental and The Trump Hotel Collection suffered similar breaches.

So how was Starwood Hotels hacked? The chain admitted that malware had infiltrated point of sale (POS) systems, including payment systems in their gift shops, bars, and other retail areas, and that 54 of their hotels had been subject to attack. Luckily, the malware was not found in the guest registration system, so sensitive personal data related to reservations and Preferred Guest Memberships was not compromised, but the breach may still affect some portion of customers who used debit and credit cards at these locations during a certain date range.

Starwood Hotels announced that the malware discovered could have infected some systems as early as November of 2014. During that time, names, credit card numbers, security codes, and expiration dates (the data on a debit or credit card) were exposed, although PINs and contact information were not. In light of the incident, Starwood has taken steps to rectify the situation and make reparations.

When the breach was discovered, Starwood claims the malware was immediately removed and efforts were made to mitigate damage, including contacting authorities and coordinating with credit and debit organizations. Further, identity protection was offered to affected parties, along with credit monitoring services. Of course, Starwood Hotels has also vowed to increase security.

The problem is that many companies are doing exactly the same dance as Starwood Hotels. They’re waiting until a major data breach occurs to beef up their security and monitoring. Starwood is big enough that this black eye won’t cost them too much – their deal to merge with Marriott International Inc. (for a reported $12.2 billion) looks as though it will proceed. But could a smaller company recover from such a breach? Maybe not.

Companies large and small remain under-protected when it comes to digital security, a point that the Starwood Hotels breach (and other recent incidents) aptly demonstrates. Consumers and credit providers are taking steps to protect their interests, most recently through the use of EMV (Europay, MasterCard, and Visa) chips that store and protect user information, as well as create unique transaction codes for every payment.

However, businesses can certainly do more to protect user data, not to mention their own reputations. Starwood may be big enough to weather the storm caused by a data breach, but smaller competitors might not be so lucky. Data breaches can cost companies untold revenue, not only from known costs like security upgrades and reparations, but also from unknown losses related to unsatisfied customers and poor public opinion.

Looking on the bright side, data breaches can force businesses to make necessary changes and upgrades to outdated or subpar security systems. However, companies suffering from such attacks will have to first survive the fallout associated with legally mandated notifications and restitution, not to mention potential lawsuits.

The good news is that businesses can take a lesson from the Starwoods of the world. Starwood Hotels, in particular, could have benefited from some kind of security monitoring. If their admissions are to be believed, their system was infested with malware for approximately a year before they even noticed. Proper monitoring software would likely have caught the breach immediately.

Naturally, there are other steps businesses can take to protect themselves as well, including firewalls, encryptions, strong password policies and programs, and the assistance of a managed services provider, just for example. Hackers can get through a lot, but they’re likely to go for easy targets. Businesses that take preemptive steps on the security front can not only decrease the likelihood of attack, but also reduce the damage done should a data breach occur.

Ensuring Your E-Commerce Site Stays Up over the Holidays

The holidays herald an uptick in traffic, and not just on the highways and in the airport. With more and more people avoiding Black Friday crowds and electing to do their holiday shopping from the comfort of home, many e-commerce sites are being bombarded by traffic from Thanksgiving to New Year’s. If your site suffers downtime during this crucial sales season, you could miss out on major opportunities to make sales and impress prospective customers.

There’s no denying that website downtime can cost you. While you might not suffer the same losses as a mega-corporation like Best Buy, Amazon, or Macy’s, you could still see prospective losses numbering in the thousands of dollars should your e-commerce site crash for any length of time. You’ll not only lose sales, but you could also irreparably damage relationships with customers. Online shoppers can be fickle, and it only takes one blackout on your site to send them running to competitors.

The good news is that you can take steps to decrease the potential for downtime, catch problems early, and plan accordingly so that you’re back up and running before anyone has noticed a service interruption on your site. Here are some tips and tricks to ensure a hassle-free holiday season where your e-commerce site is concerned.

Assess Your Hosting Service

If you’ve had trouble with downtime in the past, now may be the time to consider switching to a more reliable hosting service. You’re probably not going to find a web host that guarantees up time, but you should be able to find vendors that offer some kind of plan to deal with unscheduled downtime, and possibly even reparations should you suffer excessive downtime.

It’s also a good idea to consider a vendor that offers managed hosting services. These professionals can not only host your website, but they can also offer you cloud storage and off-site data back-up, as well as system maintenance, network monitoring, and management. You’ll pay for these additional services, but it might be worth it to avoid downtime and keep consumers happy during the busiest shopping season of the year.

Scale Up

Most businesses plan to increase products and sales during the holiday season when consumers are spending like crazy. This could mean adding more pages to your website and/or your online store, as well as fielding requests for new memberships. As a result, you may need more storage space than you currently have.

In addition, you need to prepare for an increase in traffic and online sales, which could mean increasing your bandwidth to accommodate more customers. The right web host will offer the scalable solutions your business needs to account for a bump in holiday traffic and sales.

Beef Up Security

Nothing will affect your uptime more than hackers sneaking in and wreaking havoc with your website, so it’s best to examine your security to determine if you need an upgrade. There are several steps you can take to increase security.

You probably already have basics like a web application firewall and some kind of encryption in place, as well as a password system for employees and customers to log in securely. However, you may be able to do more.

For example, you could require strong passwords and prompt users to change passwords periodically to reduce the chance of hackers cracking passwords. You should also implement a system that wipes out all fields if a username or password is entered incorrectly (instead of leaving a correct username in place and making a hacker’s job that much easier).

You can also ask your managed services provider to monitor and report back on usage as a way to ensure that you know immediately when improper usage is occurring, signaling a breach.

Hire a Monitoring Service

Comprehensive managed services providers can be expensive – too expensive for some businesses. There is an equally appealing option, though, that will save you some money and help you to minimize downtime. You can hire a monitoring service to let you know immediately when your site is down.

An appropriate service can monitor several different aspects of your online operations, alert you when downtime occurs, and provide you with detailed reports to help you avoid downtime in the future. All of this is designed to minimize downtime and help you better manage your website during the holidays, and throughout the year.

Best Practices to Avoid Online Data Breaches

data-breachIT and cyber security are growing fields for one main reason: the prevalence of data breaches. Even large companies aren’t immune – you need only look at mega-corporations like Sony and Target, health insurance providers like Anthem Blue Cross, and even the U.S. government to see that data security is a universal issue. For small businesses the problem is even worse. Although larger, more prestigious companies are more likely to have a target on their back for data breaches, malicious mischief, and identity theft, smaller businesses definitely make for easier pickings because they don’t have the same level of security that larger corporations can afford. In addition, many small businesses are woefully uninformed about how to protect their online interests. Fortunately, there is no shortage of resources available to help business owners learn about cyber security and find the best means of securing their online operations. Considering a data breach could result in any number of undesirable outcomes, including theft of sensitive employee or client data, destruction or corruption of data, government penalties, and ultimately, loss of reputation and clientele, you want to do all you can to protect your company from outside attacks. Here are some of the best practices to enact if you want to avoid online data breaches.

Properly Destroy Hard Copies

When it comes to protecting your company in the online arena, your first thoughts may not be of the data on paper copies floating around your office. However, it’s not uncommon for industrious thieves to go dumpster diving in search of that very information. After all, your paper waste can be a lot easier to access than a well-protected network. Even if you shred your documents in-office, thieves could still grab the leftovers and piece them back together. Your best bet here is to hire a mobile shredding service that offers locking bins for your office, on-site shredding while you watch, and removal and recycling of paper waste. This will provide you with the most secure means of hard copy destruction.

Web Application Firewall

Just like you have a firewall and antivirus/anti-spyware programs in place to protect your internal network, you need to take steps to protect your website as well. This is most easily accomplished by starting with a web application firewall designed to identify and block attacks on your website. There are several ways to implement this system, such as through dedicated hardware, server plugins, and so on. But these days many businesses are electing to use a cloud hosted service for the task in order to save time, money, and space.

Password Protection

Whether you’re creating a system of passwords for consumers to use when accessing your website and their online accounts or you’re working to protect your internal network and database, unique username and password combinations are a great way to prevent data breaches. Of course, you need to make sure that you exercise due diligence when it comes to creating the most effective system. For example, passwords need to be strong enough to withstand attack, and they may need to be changed frequently. In addition, you need to institute rules for employees concerning penalties for sharing passwords, as well as guidelines for customers about not using the same username and passwords that they’ve used for other websites.

Employee Training

Believe it or not, some of the biggest threats to your organization could come from within if you fail to train employees to behave appropriately when operating online. Training courses should include standard policies related to avoiding dangerous websites and suspicious emails and links, as well as sharing private information like passwords. However, you might want to take additional precautions, like utilizing web-filtering software to limit access to websites that are known threats.

Monitoring and Maintenance

These two activities are becoming more and more important. Not only do businesses need to make sure that hardware and software are updated regularly to feature the latest security measures, but they should also track usage, down time, and other aspects of online operations in order to spot potential threats and stop them before they result in disaster. While a dedicated IT staff can manage such tasks, small businesses might be more inclined to hire third-party service providers. This can actually cut costs and increase productivity because of the expertise and cutting-edge equipment and programs these vendors can provide.

Ways Your Site Downtime Can Be Costing Your Company Money

downtime-moneyYou don’t have to look far to find statistics related to the effects of website downtime – many claim that businesses lose tens of billions of dollars annually due to websites being unreachable. On a company-by-company basis, the numbers will differ, with larger businesses that suffer downtime having greater potential for loss. Unfortunately, downtime cannot be entirely avoided. For example, websites require some amount of scheduled downtime for maintenance and upgrades on a fairly regular basis. Even if you anticipate this occurrence and you take steps to inform users and minimize inconvenience, it will still cost you on some level.

As a small business owner it can be difficult to calculate the actual costs of website downtime since it is impossible to know what you’re missing out on when your site is offline and inaccessible to customers and potential visitors. However, with tracking you can get an idea of possible losses due to downtime during certain seasons or certain times of day. You first need to understand the ways in which you could be losing revenue and potential revenue when you suffer downtime, whether it is scheduled or unanticipated.


One of the easiest costs to calculate is lost sales due to downtime. While there is no way to know definitively the number of sales or amount of potential revenue lost when your website is inaccessible to customers, you can probably make a pretty close estimate for the time frame of the outage based on past sales data. This, of course, will not help you to measure the loss of potential future sales based on prospective customers finding (or not finding) your site for the first time, disgruntled patrons, and even word of mouth.

New Customers

Businesses that want to continue increasing earnings need to constantly work to expand their customer base and encourage repeat visits and purchases. This means catering to new customers. Think about this: how would you react if you were searching for goods or services online and stumbled across a website that wouldn’t load? Would you wait and try again or simply go back to your search query and click the next link for a competitor website? Internet shoppers are a fickle bunch, and they can afford to be with so many options to choose from. As a business, downtime can have a significant negative impact on your ability to bring in new clientele.

Customer Loyalty

Customers that have been satisfied with your products and services in the past are more likely to allow for a slipup when it comes to website accessibility. But if you suffer from frequent outages, you’re likely to lose even loyal customers in the process. Consumers want companies that offer convenience and reliability. They may only have to find your website down once or twice before they start seeking services elsewhere.


It is extremely difficult to calculate the cost of a waning reputation. One thing is certain, though, when you suffer frequent and/or extended downtime, you’re likely to develop a bad reputation as a result, and users aren’t shy about voicing their displeasure via consumer review sites, directories, social media, and so on. If enough people post negative comments about your business, it could be the first thing prospective customers find when searching for you. This can definitely prevent sales and patronage, which could cost you an astonishing amount in lost revenue.


It’s easy to pinpoint the ways in which downtime affects consumers, and subsequently, sales. But what about losses related to productivity? When employees are constantly fielding emails, calls, and other correspondence related to downtime, staff morale can be affected. Everyone wants to work for a company that is beloved and that they can take pride in. As morale decreases, so too can productivity, which can equate to profit loss.

Disaster Recovery

Your reaction to downtime is likely to cost you. To some degree you’ll have to go into disaster recovery mode, mitigating losses by assuaging loyal customers, offering discounts and freebies, switching service providers or upgrading to more suitable service packages, and potentially hiring an online reputation management specialist to clean up your image.


Finding the right web host can go a long way toward rectifying issues with downtime. You can also do your best to plan scheduled downtime when it will cause the least amount of potential loss, as well as providing ample warning to customers so they aren’t surprised when your site is offline for maintenance or upgrades. In addition, it’s probably best to hire a monitoring service to alert you immediately when your website is inaccessible, allowing you the opportunity to get up and running again before any damage can be done.

5 Things You Should Be Doing to Keep Your Website Secure

lock-keyIt’s practically impossible to run a business these days without a website. The time when people found you via the Yellow Pages is long gone. Nowadays, the first interaction customers have with businesses is in the online arena, and if they can’t find you online, chances are they’ll find your competitors. Your website acts as the hub of your online operation, providing consumers not only with your location and contact information, but also valuable information about your brand, your products, and your company as a whole.

You can optimize your website to increase your online presence and your chances of driving targeted traffic; and it can act as the base of operations from which to launch a blog, social media profiles, and even an online store. Of course, you need to take steps to secure your website against hackers, malicious code, spyware, and other threats that could be detrimental to your business and even harm your clientele. To this end, there are several precautions you should take.

  1. Start at the beginning. Protecting your website begins with implementing basic strategies intended to build layers of defense. For example, you should start by utilizing a web application firewall, and there are several options to consider. Although you can purchase dedicated hardware and software for this task, many modern business owners are electing to use cloud-based web application firewalls from security as a service (SECaaS) providers that offer security through hosted servers. This is both a convenient and affordable option that allows businesses to benefit from the most up-to-date website security options without having to keep appropriate hardware on site or hire security professionals to maintain the system.
  2. Update regularly. Many programs allow you the option to institute automatic updates, alleviating you of the responsibility to do so. However, this won’t work for every program or piece of equipment you utilize for your business. If you want to ensure security for your website and associated systems, you need to take the necessary steps to remain current with all appropriate software and firmware updates. Otherwise you could miss out on vital fixes needed to protect against new threats.
  3. Utilize passwords. Anyone who accesses your system, from administrators, to employees, to customers, should not only have a username and password, but should be made to utilize the best possible practices where passwords are concerned. This means instituting restrictions that call for strong passwords (i.e. those of 8 or more characters, including alphanumeric characters, upper and lower case, and even symbols), as well as forcing users to create new passwords regularly – say every 2-3 months. Since many hacks and malicious attacks are the result of automated code looking to infiltrate websites via dictionary (or similar) attacks in order to take advantage of mailing lists or engage in identity theft, strong passwords are an essential line of defense. You should also warn users to create different passwords for every site they visit so that if their accounts are hacked elsewhere your website will not be compromised. In addition, you can help to increase protections by not giving away too much information. For example, when a username or password is wrong, don’t display an error message that says which one is wrong. Cancel both fields so that hackers and malicious programs don’t know which one is correct.
  4. Test security. If you’re not testing your security, you won’t know if it’s faulty until you’re hacked. Unless you have a background in IT and the ability to dedicate time to ensuring website security, your best bet here might be to hire a third party to undertake this testing for you. Plenty of reputable IT service providers can accommodate you and even make recommendations for ways to upgrade your security measures. You could also hire in-house IT staff for this purpose and for ongoing maintenance and monitoring.
  5. Get professional help. The average business owner isn’t likely to have a strong background in online security. The good news is that you can hire qualified professionals to provide you with the diagnosis, advice, and services needed to put appropriate security measures in place. Your website is a tool that can help you connect with and serve your customers; you don’t want it to turn into a liability. Hiring experts to meet all of your security needs will help to ensure that you never have to deal with the fallout from a website security breach.

How Website Monitoring Can Improve Employee Productivity

website-monitoringMeasuring success and productivity within a business organization used to rely on end results. These days there is software to monitor everything from keystrokes to the amount of time a computer has been idle in order to generate reports for employers to gauge how much their employees really accomplish in a day. While small businesses might not necessarily be interested in becoming “Big Brother” and watching every move their employees make, you certainly need to consider the fact that certain programs and practices, such as website monitoring, can serve to increase security and make your employees more productive and your business more profitable.

What is website monitoring? Website monitoring is the examination of a company’s website performance, including uptime, outages, functionality, and usage, to ensure users have optimal and expected interaction with a site. Today businesses can take advantage of several different types of monitoring software or services. For example, you can hire a company to monitor and inform you of downtime on your own website, helping you to better serve customers that wish to access your website or their online accounts with your business. There are also a variety of tools that can track network usage by employees in order to spot dangerous or merely inappropriate behavior so that you can find ways to reduce threats and increase productivity.

You can implement such IT solutions yourself if you happen to have an in-house IT staff. If you can’t afford this pricy addition to your head count, however, it’s probably best to hire a third-party managed services provider that offers website monitoring, as well as web filtering (or content control). It’s not always enough to be aware of what your employees are doing on your network – you may also have to take steps to restrict their access so as to reduce the potential for data breaches, not to mention the many distractions the internet can provide.

How does website monitoring work? It starts with tracking network usage. With the appropriate software solutions, you can begin to see patterns in usage and pinpoint anomalies. You may, for example, find that you often experience lag and down time when using your network. A monitoring service could provide you with the data and analysis needed to realize that certain employees are hogging bandwidth during the day by streaming music or videos. When you are aware of such behavior you can put a stop to it, increasing the speed of your network and improving potential productivity.

Monitoring can also help you to spot outside attacks. Many systems and services offer alerts that let you know when your system is down or under attack, allowing you to more quickly put a stop to data breaches and the damage they can cause. In terms of productivity, there are few things worse than data breaches, not only because of theft, corruption, or destruction of files, but also due to the response activities that will follow, including investigation, increased security, cleanup, and notifications of the breach; all can slow your workflow to a crawl.

Of course, that’s just the tip of the iceberg when it comes to what monitoring software and services can help you accomplish. In addition to watching and reporting on employee activity, the right monitoring solutions can also help to curb wasteful habits. This is where web-filtering programs come into play. Such software is designed not only to track network usage, but to restrict or block access to sites that could pose a threat to security. Some produce a warning message when users are about to visit a dangerous website or click a spammy link. Others outright forbid such activity and stop the user from proceeding.

Such software can also be used to deny access to websites of your choosing. If you don’t want employees spending all day on Facebook and other social networking sites, all you have to do is block them. When you remove such temptations and time wasters, you stand to increase employee productivity by a significant margin. Although you want to trust your employees to behave responsibly while they’re on the clock, you also have to behave in a responsible manner if you want your business to be profitable. This could mean not only keeping an eye on network usage, but also implementing measures to ensure that your employees follow company policies regarding proper behavior on the company network and the company dime.

Avoid Downtime Due to Hackers

As I learned with my personal blog, your site doesn’t have to be big and important in order to be a target of hackers. In fact, small business sites and personal blogs make great targets because they don’t normally have someone on staff to secure it.

Thankfully, I had a backup and I wasn’t counting on revenue from my site. Not everyone is so lucky.

Fortunately, it doesn’t take much to give your site some basic protection against downtime due to hackers.

Keep Software Up To Date

When software or plugins come out with updated versions, it is often because there were security holes that needed to be fixed. My site was hacked by a script that crawled the internet to find sites with old versions of WordPress. I could have avoided the whole mess if I had just taken a few minutes to click the Update link in my WP admin.

Use Secure Passwords

This seemed almost too obvious to add to the list until I read that “123456” had finally overtaken “password” as the most common password.

You don’t have to go crazy with an obnoxiously long and impossible to remember password, but at least stay away from the most obvious choices like your domain name, your username, “admin”, and “test”.

Backup Your Site

In addition to defacing my site, the script that hacked my site also installed a number of hidden files that sent emails and who knows what else.

I could have just swapped out the home page, but starting with a clean backup ensured that these hidden files didn’t stick around and cause damage.

Avoid File Uploads

Allowing file uploads gives hackers yet another access point to get into your site. Even image uploads can be risky and you cannot rely on the extension.

The best solution is to prevent direct access to uploaded files altogether, but if this isn’t an option, you may want to consider consulting a professional.


SSL is a security protocol that is used to prevent attackers from “sniffing” data as it passes between the website and web server or database.

If your site collects payment information or personal data, you should consider using SSL to keep it secure.

Monitor Your Site Content

When your site is hacked, the sooner you know about it the better. One way to find out if your site has been defaced is by monitoring a snippet of content on your site that does not (or should not) change.

Content monitoring is available at no extra charge on all of our $5/mo+ plans. To enable content monitoring on a new or existing SiteUptime monitor, follow the simple steps below:

  1. Log into your Control Panel and click on “My Monitors”.
  2. Click the “Options -> Edit” link next to the monitor you wish to edit or click the button to add a new monitor.
  3. Click the Advanced Options button.
  4. Towards the bottom of the form, you will see “Monitor Page Content”. Enter the snippet you wish to monitor and you will receive an alert if the that content cannot be found.



Are You CC’ing Your Web Host on Your Email Alerts?

m-notifyingYourHost-155x155The only thing more annoying than your site going down at 2:00 in the morning is having to get out of bed to send an email to your web host and then stay up and play middle-man until the issue is resolved.

One way to get a little more sleep is to just CC your host on your downtime alert emails.

On the Add/Edit Monitor page in your Control Panel, simply enter your host’s support email address in the “CC the Following Addresses” field.

(Note: Please be respectful of your web host’s time. If your site frequently goes down for reasons outside of your host’s control, you probably shouldn’t use this feature.)

Want to Stay in the Loop on the Alerts?

By default, alert emails are sent from “”, so if your host wants to respond you won’t get the message.

Keep yourself in the loop by changing the From and Reply To email addresses to yourself or your admin. Then, when your host responds, they will actually be responding to you.

To change this information,  go to the Edit Profile page in your Control Panel, and look for the “Change ‘From’ and ‘Reply-to’ email” field. Don’t forget to save your changes!

Log Into Your Control Panel – or – Register For A New Account

Re-Introducing, Our Website Monitoring Webhook

If you have been with SiteUptime for awhile, you have probably stumbled upon a few of our “surprise features” while working in your control panel. These are big/small/medium-sized system enhancements that we scope, develop, test, and deploy without really telling anyone.

One of these surprise features is our Website Monitoring Webhook which went live months ago, but was never properly introduced.

This user-requested functionality allows you to specify the URL of a script where we can send data when an event occurs with one of your monitors. You can use it to customize your email routing, trigger an event in your system, switch to a backup, etc.

Learn More >