How to read your pro-active support report

thunder::tech's pro-active support subscription offers many statistics on the uptime and security of your site. Below we explain the sections that would appear on the pro-active report.



Percentage of time when your website was active and functional.  You should expect this to be above 99% at all times.


Amount of times when the monitoring service saw that your website was not available.

Response Time

Amount of time in milliseconds it took for the website to start loading.  Under normal circumstances, this should always be below 1000ms.

Hosting News

This would list news entries/events that have happened with your corresponding hosting area.  This would also include any possible issues that your current hosting area might have, or would be happening soon.

CMS News

News entries/Events that would have been happened with your corresponding content management system.  This would also include any possible issues that your current CMS might have, or would be happening soon.




Security involves throwing around a lot of terms that may not make sense initially.  We hope to clear up the confusion and explain many of the most used terms.


An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

Website Blacklisting

In the context of websites, blacklisting refers to the process of search engines removing a website from their index. Webmasters pay close attention to this because when blacklisted, a site loses nearly 95% of its organic traffic, which can quickly impact sales and revenue.

Injected SEO Spam

Spam content injected onto the website will sometimes only appear if it detects that a search engine spider (Google, Bing) is viewing the page.  When a normal user views the website, the website appears normally.  This allows the attacker to bring SEO rankings down on the victim site, or boost another site’s SEO rankings.


Website files have been edited to show a message from the hacker.  Most instances of defacement have little to no financial incentive. They are almost always done to further some political, religious or ideological goal.

Malicious Redirects

Users who browse the website (or a specific page) will be forced to redirect to a malicious file/domain.  Attacks utilizing malicious redirects are meant most of the time to spread malware to your users. 

Conditional Malware

Malware that is spread based on conditions set by the attacker.  This attack can be dependent on who visits the site, and/or what page the person is browsing.  An attacker can use parameters such as IP addresses and browser detection.

Outdated Software

A critical security update was detected for software that is running on the website server.   Security updates for content management systems fall into this category.  We always recommend that security updates are installed as soon as possible.


Have more questions? Submit a request
Powered by Zendesk