The 2017 Mid-Year Status Of Web Security: DDoS And More

While the recent WannaCry attacks have kept ransomware front-and-center in the news, businesses can’t forget about protecting themselves from distributed denial of service (DDoS) attacks. According to ZDNet, Ransomware and DDoS are the top digital security threats the public faces today. While ransomware holds data hostage on one side, Internet of Things-based botnets create DDoS attacks on previously unimaginable scales on the other.Read More

Load Time Killing Content Creation Mistakes

We’ve previously examined many of the root causes of poor website and application load times on the technical side in the past like failing to implement a monitoring strategy and inefficient scaling. While IT staff and programmers have plenty to keep themselves busy with improving platform performance, some of the burden also falls on the people who createRead More

What Data Points Should You be Monitoring when Measuring Web Performance

Measuring Web Performance Needless to say, top-notch web performance is crucial for any company, regardless of size. When monitoring the real-time performance of a website or application, there are a number of measurable data points and operations that should be clearly understood in order to gain an accurate analysis of a site’s performance levels andRead More

Get your Website Holiday Ready with our Upcoming Webinar

A record $12.8 billion dollars were spent online over Black Friday and Cyber Monday alone last year. Over this period, as little as three seconds can come between you and your largest source of revenue – with Amazon at risk of losing $1.6 billion in sales if their website crashes. During the holiday season, yourRead More

What’s the Difference Between Automated Testing and Manual Testing

  Software testing is a huge domain, but it can be broadly categorized into two areas: manual testing and automated testing. Both manual and automated testing offer benefits and disadvantages. It’s worth knowing the difference, and when to use one or the other for best results. In manual testing (as the name suggests), test casesRead More

Civil Service and the Online Experience

The Apica team is looking forward to attending the government’s annual, cross-department learning event, Civil Service Live. The event, which takes place on 11-12 July at QEII Centre, London, attracts thousands of civil servants to learn, network and share best practice – with the ultimate goal of providing better public service. Government and Civil Service institutionsRead More

Where Do Your Website Problems Really Lie?

When the check engine warning light comes on in your car you may find yourself chasing error codes to find out what the problem is. When the mechanic attaches his diagnostic equipment he will be presented a code that the computer provides. What often turns out to be true, however, is that the error codeRead More

Why your Business Needs a CDN

A Content Delivery Network is a geographically spread-out network of servers configured to decrease the amount of time it takes for visitors to load a website. Using a CDN can make a huge difference for businesses looking to give their website an edge over the competition by creating a smoother user experience. Additionally, CDNs can helpRead More

DDoS Aftershock: SEO Damage

A distributed denial of service attack, or DDoS, is a bad enough inconvenience concerning your company’s website and application performance, so it’s even more frustrating to know that it could cause your site’s appearance in search engine results to take a hit. This is particularly annoying for businesses because the SEO hit doesn’t stem fromRead More

Routers: Both Targets And Perpetrators In DDoS Attacks

The most recent major distributed denial-of-service attacks have stemmed from hackers hijacking countless Internet of Things devices and using them to create massive botnets to knock down servers; however, other devices like routers are still major contributors. Routers have the unfortunate distinction of often being targeted during a DDoS attack and as a device capable ofRead More