Google Domains to Shut Down, Sold to Squarespace

Google has announced that it is shutting down its domain registrar business, Google Domains. The service will be winding down following a transition period, with Squarespace taking over the business and assets.

A history of shutting down good projects

The announcement came as a surprise to many, as Google Domains had only recently exited beta in March 2022. The service was well-received by users, offering a simple and affordable way to register and manage domains.

To others, this may not be a surprise. Google has a long history or coming our with a great product, then shutting it down. Projects include Google+, Google Reader, Google Wave, Google Glass, Google Allo, and the list goes on an on.

In a blog post, Google said that the decision to shut down Google Domains was made “as part of our efforts to sharpen our focus.” The company said that it would continue to offer domain registration through its other products, such as Google Workspace and Google Cloud Platform.

Squarespace, which provides website building and hosting services, said that it was “excited” to acquire Google Domains. The company said that it would integrate Google Domains into its own platform, making it easier for users to register and manage domains.

The acquisition is expected to close in the third quarter of 2023. Once the acquisition is complete, Google Domains customers will be migrated to Squarespace.

What does this mean for Google Domains customers?

Google Domains customers will need to take action to ensure that their domains are migrated to Squarespace. Google will provide more information about the migration process in the coming months.

In the meantime, customers can continue to use Google Domains as usual. Their domains will remain active until the migration is complete.

Continue Reading

Using Nagios XI to Monitor More Than Servers and Network Devices

Nagios XI is a powerful network monitoring tool that is typically used to monitor servers, applications, and network devices. However, Nagios XI can also be used for a number of unusual purposes. Here are a few examples:

  • Monitoring physical security: Nagios XI can be used to monitor physical security devices, such as door locks, motion sensors, and fire alarms. This can be helpful for organizations that want to ensure the safety of their employees and property.
  • Monitoring environmental conditions: Nagios XI can be used to monitor environmental conditions, such as temperature, humidity, and air quality. This can be helpful for organizations that need to ensure that their facilities are operating in a safe and comfortable environment.
  • Monitoring employee productivity: Nagios XI can be used to monitor employee productivity. This can be done by tracking the amount of time that employees spend on certain websites or applications. This information can then be used to identify areas where employees are wasting time and make changes to improve productivity.
  • Monitoring customer satisfaction: Nagios XI can be used to monitor customer satisfaction. This can be done by tracking the number of customer complaints and the time it takes to resolve them. This information can then be used to identify areas where customer service can be improved.

These are just a few examples of outside the box ways to use Nagios XI. If you have a creative mind, there are probably many other ways that you can use Nagios XI to improve your organization’s operations.

Here are some additional tips for using Nagios XI:

  • Be creative: Don’t be afraid to think outside the box when you’re using Nagios XI. If you can think of a way to use Nagios XI to improve your organization’s operations, then go for it!
  • Get help: If you’re not sure how to use Nagios XI in a particular way, there are plenty of resources available to help you. MCS can provide implementation help for writing custom plugins.
  • Have fun: Nagios XI is a powerful tool, but it doesn’t have to be all work and no play. If you can find ways to use Nagios XI to make your job easier or more enjoyable, then that’s a win-win!
Continue Reading

Small Business Cyber Security Can’t be Ignored

In today’s climate of cyber threats, small business cyber security has become more important than ever. With the rise of technology and the increasing reliance on cloud platforms for business operations, small businesses are no exception to this rule. In fact, they are even more vulnerable to cyber attacks due to their limited resources and knowledge of cybersecurity. Therefore, it is crucial for small businesses to understand the importance of cybersecurity and take appropriate measures to safeguard their operations.

One of the biggest reasons why small businesses need to prioritize cybersecurity is the threat of data breaches. Cyber criminals are constantly looking for ways to steal sensitive information such as customer data, financial records, and intellectual property. If a small business falls victim to a data breach, it can have a devastating impact on their reputation and bottom line.


Another reason why small businesses need to prioritize cybersecurity is the growing prevalence of ransomware attacks. Ransomware is a type of malware that locks a business’s files and demands a ransom payment to release them. Ransomware attacks have become increasingly common in recent years. For small businesses, the impact can be particularly severe as they often lack the resources to recover from an attack.


Moreover, small businesses are more vulnerable to phishing attacks, which are designed to trick individuals into revealing sensitive information such as passwords or bank details. These attacks are often carried out through email, and small businesses are particularly susceptible to them because they may not have the resources or knowledge to identify and prevent them.

Legal Issues

In addition to the potential financial and reputational damage, cyber attacks can also have legal consequences. Small businesses are subject to a range of regulations and legal requirements regarding data protection and privacy. Failure to comply with these regulations can result in fines and legal action, which can be costly and time-consuming.

Therefore, it is essential to take proactive steps to protect themselves from cyber attacks. This includes implementing robust cybersecurity measures such as firewalls, antivirus software, and regular data backups. Small businesses should also provide training to their employees on how to identify and prevent cyber attacks. They should establish clear protocols for responding to security incidents.

In conclusion, small business cyber security is crucial. The risk of cyber attacks is increasing, and small businesses are particularly vulnerable. Therefore, small businesses need to prioritize cybersecurity and take appropriate measures to protect themselves from the potentially devastating consequences of cyber attacks. By doing so, they can safeguard their operations, reputation, and financial stability in the long term.

Contact MCS to learn more about how our managed small business cyber security offering can get your business secured and put your mind at ease.

Continue Reading

Manually Install Nagios XI on Linux, the Easy Way

Installing Nagios XI has one the easiest setups around. While Nagios XI is not officially offered through standard repositories, the process is still so easy. In many cases, when we are starting fresh with a brand new Nagios installation for a customer, our engineers will use the .ova image. This is quick and easy but offers fewer options. When the VMware image is not ideal, we use the method below to manually install Nagios XI on Linux.

    1. Install your preferred Linux OS. Nagios XI is officially supported on CentOS, RHEL, Debian, Ubuntu, and Oracle Linux. We recommend a minimum install with no GUI to optimize performance and decrease your security footprint.
    2. Once your OS is installed, go ahead and make sure it has Internet access and run a full update using yum or apt-get. Restart.
    3. Run this command as root/superuser (you may have to install curl depending on how minimal your install was)
      curl | shThis script will automatically download and install the latest version. Grab a cup of coffee, this will take several minutes.
    4. Once the wall of streaming text stops you should be greeted with a message telling you what URL to use to continue your setup.


Finish Up your Manual Nagios XI Installation via Browser

Now, you can use a web browser to set the Nagios Admin username and password. You can also install a license, activate a free trial, or go straight into the free 7 host mode. Many large organizations we have worked with will have a customized base image of Linux they deploy with custom login servers, security settings, and integrations built-in. This type of customization will work with Nagios but we always recommend that the base OS be as minimal as possible. Custom firewall rules and other security settings may not work without extra configuration.

If your organization would like expert assistance with your Nagios XI deployment, contact MCS for a free quote. We can assist with projects of all sizes. Our Nagios experts can help you manually install Nagios right the first time.

Continue Reading
Nagios consultant

4 Benefits of Using A Professional Consultant When Getting Started With Nagios XI

Modern networks have become so advanced over the years that it’s almost impossible to keep track of issues without software.
It’s mind-boggling how many different types of devices now make up contemporary networks.
However, when it comes to open-source network monitoring tools, companies worldwide turn to Nagios.
Nagios keeps an eye on network issues while also helping you gain extensive insight with enterprise-class network monitoring, alerts, and analysis.
But did you know that you can make your life much easier by hiring a professional Nagios consultant?
Curious to know how? Then keep reading to find out the benefits of hiring one to get started with Nagios XI!

1. Save Money with a Nagios Consultant

If you want to look at the big picture and save valuable money, consider getting in touch with a professional who knows what they are doing.
But how does that work?
Well, the math is simple.
Hiring an expert Nagios consultant will reduce the number of man-hours and ultimately cost you less.
So, rather than watching your current IT department—which may not have much experience with network monitoring software—go around in circles, reach out to a professional.  Experts can work on the project with precision without wasting time.

2. Ensure Precision

Your organization needs to ensure it is following the best practices when setting up network monitoring to make software maintenance as efficient as possible.
Aspects such as notifications, accessing dashboards, and adding and removing hosts and services should be set up properly, so network monitoring is carried out without any issues.
For instance, timely and accurate notification delivery is crucial to preventing system failures.
Therefore, hiring a professional will guarantee that your Nagios XI installation is done accurately and following best practices the first time.

3. Get Quality Training & Management

A professional Nagios consultant will provide training to your staff, ensuring they are well-equipped to deal with issues.
This way, you will have the surety of documentation and training to hand off the project to your team – regardless of whether the consultants build your organization’s whole monitoring infrastructure from scratch or collaborates with your current IT department.

4. Get Up & Running Without Wasting Time & Energy

Setting up Nagios IX in your organization is a fairly complicated task, and hiring a Nagios consultant to perform it is always a good idea to ensure it is done right.
So, if you need to start your project off on the right foot, reach out to experts who will install Nagios and work with your team to set up the foundation needed for a successful Nagios implementation.

The Gist

Nagios is renowned as the best tool for various server monitoring tasks.
If your company is looking for a professional Nagios Core or XI consultant when starting Nagios XI deployment, feel free to reach out to MCS.
Our competent experts will work with you and your team to install, implement, and manage Nagios products.

Continue Reading
Internet Explorer End of Life

Internet Explorer End of Life is Finally Here

While some may be sad to see the Internet Explorer End of Life, fortunately, there are alternatives to Internet Explorer, so most users needn’t worry about losing access to Microsoft’s online services. There are many benefits to using a new browser instead. The latest version is called Microsoft Edge, and its Chromium-based architecture aims to rival Google Chrome and offer a friendlier user interface on touch-supporting PCs. Luckily, there’s a way to accommodate those users who still need to use Internet Explorer.

Microsoft Edge

The usage share of Internet Explorer is quite small, with less than 5.5 percent of the market. Microsoft doesn’t publish official numbers, but third-party stats put it at 5.21 percent. In addition to this, Edge is already the default browser for Windows 11, and most home users have already switched to it.

Microsoft is phasing out Internet Explorer, with its last major version ending on June 15, 2022. Users of the browser should migrate to the latest version of Microsoft Edge, which has been optimized for security and speed. In addition to speed and security, Microsoft Edge also works with legacy applications.

While Internet Explorer End of Life is here now, Microsoft will still support its browser in Edge until 2029. Users of the IE11 desktop application will continue to be redirected to Microsoft Edge. To make the transition to the new browser easier, Microsoft is keeping a legacy browser mode available for Edge.

Built-in Internet Explorer Mode

Considering moving to Microsoft Edge after internet explorer end of life? If so, you’ll be moving to a new, improved browser that supports legacy web browsers. Microsoft Edge is much faster than IE and more secure but still supports legacy browsers. It even has an IE mode that allows you to use older IE websites.
When it is retired by its creators, Internet Explorer will be redirected to Microsoft’s Edge browser, and it will no longer be available on newer versions of Windows. Microsoft Edge comes with IE mode, which you can manually enable or disable, so you can continue to access legacy Internet Explorer sites and apps. You can set it up in the Getting Started guide, and consumers can enable it themselves.

What Does Microsoft Say about Internet Explorer End of Life?

“The good news: you probably already have it on your device. Search for “Microsoft Edge” using the Windows 10 search box or look for the icon (see the top of this article). If you don’t have it, you can easily download it here. We’ve also aimed to simplify the upgrade to Microsoft Edge; once you’ve opted to move to Microsoft Edge, it’s easy to bring over your passwords, favorites, and other browsing data from Internet Explorer in a few clicks. And if you run into a site that needs Internet Explorer to open, Microsoft Edge has Internet Explorer mode built-in so you can still access it,”

Bottom Line

While IE11 is being phased out, developers and users should prepare now for the transition to Microsoft Edge. Although the transition from IE11 to Edge may seem daunting, it will be done gradually and according to industry best practices. And because Microsoft has said it will end support for Internet Explorer in 2022, it’s worth preparing for it. After all, it is faster, safer, and compatible with legacy apps and sites.

Continue Reading
Duo Logo

Using Duo MFA to Harden Security

Single factor authentication to business systems is no longer enough to protect company data access. We live in a world of ever evolving threats and data breaches that can leave your private data exposed to hackers. Duo MFA is the simple, secure answer.

A Password is Not Enough

A password as a form of identity verification has always been a poor tool for the job. Any person, or bot, can use a known password to gain access to a system not meant for them to access. With massive data breaches becoming the norm, there is a better chance than ever that an old password is know by bad actors. It all comes down to trust. A password is essentially anonymous. While complex passwords and regularly changing them is still important, you can add another line of defense in case a password has been compromised.

Duo MFA Adds Another Layer

Duo is a widely used multi factor authentication solution trusted by smart organizations that take security seriously. Everyone with an online bank account has had to verify their identity with an emailed or texted code at one point or another. Ever wondered why you have to do this for your bank and not for your work systems? Think about what an attacker would have access to if they were to access your work computer under your login. They would instantly have access to your files, saved web passwords, and if services are set to trust your computer, they have access to them as well. Traditionally, corporate networks have been behind the times when it comes to authentication.

Duo MFA provides an affordable solution to the problem of 2 factor compliance. Their authentication software can be automatically installed  on all company computers with ease. Once installed, users can be setup automatically, and enroll with Duo quickly. Then, they can pick push authentication on their smartphone, text, email, or even a phone call to verify they are who they say they are. These options can be set by the organization depending on need.

Pay as You Go

Organizations can purchase licenses directly from MCS and will be billed as little as $3 / user / month. There are no contracts either. Check with your insurance carrier for possible discounts offered by using Duo MFA. MCS has the experience to deploy Duo on your systems so only authorized employees can access your data.

Continue Reading
Network Monitoring

5 Reasons Organizations of any size need Network Monitoring

Today, many organizations face the tedious challenge of 24/7 availability and productivity. Undoubtedly, technology is rapidly changing with the evolution of business IT requirements, and the cybersecurity threats to your organization’s data have the potential to disarm your operation. However, Network monitoring solutions play a crucial part in organizations because they rely on their internal network to be productive.

Generally, there are various serious threats to your business, including Network failures and irregularities, server downtime, and service or application crashes. These threats can cost thousands of dollars in revenue and productivity. Network monitoring solutions are important because they deliver better services and reduce costs. In this article, we will discuss the various reasons to choose network monitoring solutions. The following information is quite beneficial whether you are a CEO, executive, IT manager, or IT Administrator.

What is Network Monitoring?

It is crucial to know that Network monitoring plays a significant role in any size of an organization. The network is a significant factor for any modern corporation, and if it slows down, its failure is quite costly. Usually, Network monitoring is a system to view the health of an organization, including devices, traffic, and servers. It can help to identify potential problems and prevent any network issues. In simple words, Network monitoring systems are just tools that can help administrators monitor their networks more effectively. MCS uses and recommends Nagios XI for most customers but there are many solutions.

Do you want to know why your organization requires Network Monitoring? Let’s take a deep look at 5 different reasons to choose Network monitoring for your organization.

1. Key insights of organization infrastructure

Network monitoring allows you to keep historic reports about how your internal infrastructure has performed. Generally, historic data analysis can be very beneficial to determine whether your current system landscape can meet business requirements or if you need to invest in new technology. For instance, a network administrator is trying to convince their management that it is crucial to upgrade the current infrastructure because it’s not sufficient to meet the current organization’s requirements. In that case, a historic report is made to evaluate the overall past few months’ performances with the most reliable predictions for the future.

2. Fix issues and identify security threats

If you’re in a situation dealing with a configuration error or an abnormal traffic fluctuation, network monitoring software can help you to get to the bottom of your issues. Network monitoring tools can provide excellent security to your organization. The obvious benefit you can commonly get is a high-level performance for your organization. You can spot any unusual threats including a spike in traffic levels or a harmful device that’s connected to your network. So, Network monitoring can figure out when and on what device an event occurred. Then, you will be able to take a proactive approach to solve any network security issue.

3. Increased Return on Investment (ROI)

Monitoring IT infrastructure is considerably helpful for many organizations financially because it is cost-savings. However, it can also increase the return on investment. Primarily, you must have an IT budget for your organization to spend on software and network infrastructure, IT labor, maintenance costs, and hardware costs. Unfortunately, the outdated network system can harm the return on investment. In that case, if you consider efficient Network monitoring for your organization, it provides the flexibility and scalability to grow your business, and you can easily save most of your IT expenses every month with far better improvements. No doubt, Network Monitoring plays a crucial part in cost saving and return on investment.

4. Prevention from Cyber Attacks

Network monitoring is significant for fighting against cyber-attacks. Cybercriminals are more advanced these days. Knowing the difference between a cyber-attack and normal-behavior, your team can react proactively. Recently, network monitoring prevented the Anthem medical data breach in 2015 by noticing user behavior. These attackers submitted database queries to obtain PII records, a costly type of cyber-attack. The database contained up to 80 million customer records in this attack.

5. Optimized performance, Minimized risk, and Maintained Compliance

Network monitoring systems provide optimize a network’s performance, solve attacking problems, and prevent you from developing problems by identifying slowdowns and collecting performance data. One of the apparent benefits of a network monitoring system is its potential to identify malicious network behavior. Undoubtedly, Network monitoring systems can track network security threats ranging from unauthorized downloads to password changes and flag any abnormal behavior. Further, it ensures that breaches can be identified and mitigated immediately. Most of the compliance with regulatory entities like HIPAA, ISO 27001, and PCI DSS is significant for many organizations. These regulations need network monitoring for best practices and security measures.

Future of Network Monitoring

With the advancement of technology, many devices have become network-based. This obviously increases the stress on network teams. On top of that, IoT devices have changed the way organizations think about networks. However, there is needed to improve the organization’s infrastructure because multiple DDoS attacks have been seen due to unsafe IoT devices.
No doubt, IoT changes our way of our thinking about networks. Monitoring networks is becoming more challenging with that addition of so may different types of devices.  Monitoring solutions certainly will allow you to discover future problems with your network and provide efficient and reliable services to your users.

Continue Reading