{"id":76457,"date":"2024-03-29T15:51:52","date_gmt":"2024-03-29T07:51:52","guid":{"rendered":"https:\/\/version-2.com\/?p=76457"},"modified":"2024-03-27T14:43:10","modified_gmt":"2024-03-27T06:43:10","slug":"what-is-alert-fatigue-and-its-effect-on-it-monitoring","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/03\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\/","title":{"rendered":"What is alert fatigue and its effect on IT monitoring?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"76457\" class=\"elementor elementor-76457\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg\" width=\"980\" height=\"536\" \/><\/p><div class=\"entry-content\"><p>Talking about too many cybersecurity alerts is not talking about the story of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Peter_and_the_Wolf\" target=\"_blank\" rel=\"noopener\">Peter and the Wolf<\/a> and how people end up ignoring false warnings, but about its great impact on security strategies and, above all, on the stress it causes to IT teams, which we know are increasingly reduced and must fulfill multiple tasks in their day to day.\u00a0<\/p><p><a href=\"\/\/www.bing.com\/ck\/a?!&amp;&amp;p=0d8674e80fc4f0f9JmltdHM9MTcwOTg1NjAwMCZpZ3VpZD0yOWQ2MDg0Zi1jODBmLTYyODQtM2IxNy0xOTNmYzk0ZTYzMmUmaW5zaWQ9NTIwOQ&amp;ptn=3&amp;ver=2&amp;hsh=3&amp;fclid=29d6084f-c80f-6284-3b17-193fc94e632e&amp;psq=wikipedia+alert+fatigue&amp;u=a1aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvQWxhcm1fZmF0aWd1ZQ&amp;ntb=1\" target=\"_blank\" rel=\"noopener\">Alert Fatigue<\/a> is a phenomenon in which excessive alerts desensitize the people in charge of responding to them, leading to missed or ignored alerts or, worse, delayed responses. IT security operations professionals are prone to this fatigue because systems are overloaded with data and may not classify alerts accurately.<\/p><div class=\"indice\"><p><strong>Content:<\/strong><\/p><ul><li><a href=\"#1\">1. Definition of Alert Fatigue and its impact on organizational safety<\/a><\/li><li><a href=\"#2\">2. Causes of Alert Fatigue<\/a><\/li><li><a href=\"#3\">3. Most common false positives<\/a><\/li><li><a href=\"#4\">4. Consequences of Alert Fatigue<\/a><\/li><li><a href=\"#5\">5. How to avoid these Alert Fatigue problems?<\/a><\/li><li><a href=\"#6\">6. Conclusion<\/a><\/li><\/ul><\/div><h2 id=\"1\">1. Definici\u00f3n de Fatiga de Alertas y su impacto en la seguridad de la organizaci\u00f3n<\/h2><p>Alert fatigue, in addition to overwhelming data to interpret, diverts attention from what is really important. To put it into perspective, deception is one of the oldest war tactics since the ancient Greeks: through deception, the enemy\u2019s attention was diverted by giving the impression that an attack was taking place in one place, causing the enemy to concentrate its resources in that place so that it could attack on a different front. Taking this into an organization, cybercrime can actually cause and leverage IT staff fatigue to find security breaches. This cost could become considerable in business continuity and resource consumption (technology, time and human resources), as indicated by an article by <a href=\"https:\/\/www.securitymagazine.com\/articles\/97260-one-fifth-of-cybersecurity-alerts-are-false-positives\" target=\"_blank\" rel=\"noopener\">Security Magazine<\/a> on a survey of 800 IT professionals:<\/p><ul class=\"lista\"><li>85% percent of information technology (IT) professionals say more than 20% of their cloud security alerts are false positives. The more alerts, the harder it becomes to identify which things are important and which ones are not.<\/li><li>59% of respondents receive more than 500 public cloud security alerts per day. Having to filter alerts wastes valuable time that could be used to fix or even prevent issues.<\/li><li>More than 50% of respondents spend more than 20% of their time deciding which alerts need to be addressed first. Alert overload and false positive rates not only contribute to turnover, but also to the loss of critical alerts. 55% say their team overlooked critical alerts in the past due to ineffective prioritization of alerts, often weekly and even daily.<\/li><\/ul><p>What happens is that the team in charge of reviewing the alerts becomes desensitized. By human nature, when we get a warning of every little thing, we get used to alerts being unimportant, so it is given less and less importance. This means finding the balance: we need to be aware of the state of our environment, but too many alerts can cause more damage than actually help, because they make it difficult to prioritize problems.<\/p><h2 id=\"2\">2. Causes of Alert Fatigue<\/h2><p>Alert Fatigue is due to one or more of these causes:<\/p><h3>2.1. <a href=\"https:\/\/pandorafms.com\/blog\/false-positives-in-monitoring\/\" target=\"_blank\" rel=\"noopener\">False positives<\/a><\/h3><p>These are situations where a security system mistakenly identifies a benign action or event as a threat or risk. They may be due to several factors, such as outdated threat signatures, poor (or overzealous) security settings, or limitations in detection algorithms.<\/p><h3>2.2. Lack of context<\/h3><p>Alerts must be interpreted, so if alert notifications do not have the proper context, it can be confusing and difficult to determine the severity of an alert. This leads to delayed responses.<\/p><h3>2.3. Several security systems<\/h3><p>Consolidation and correlation of alerts are difficult if there are several security systems working at the same time\u2026 and this gets worse when the volume of alerts with different levels of complexity grows.<\/p><h3>2.4. Lack of filters and customization of cybersecurity alerts<\/h3><p>If they are not defined and filtered, it may cause endless non-threatening or irrelevant notifications.<\/p><h3>2.5. Unclear security policies and procedures<\/h3><p>Poorly defined procedures become very problematic because they contribute to aggravating the problem.<\/p><h3>2.6. Shortage of resources<\/h3><p>It is not easy to have security professionals who know how to interpret and also manage a high volume of alerts, which leads to late responses.<\/p><p><strong>The above tells us that correct management and alert policies are required, along with the appropriate monitoring tools to support IT staff.<\/strong><\/p><h2 id=\"3\">3. Most common false positives<\/h2><p>According to the <a href=\"https:\/\/www.institutedata.com\/us\/blog\/what-is-a-false-positive-in-cybersecurity\/#:~:text=Security%20magazine%20reports%20that%20as%20many%20as%20one-fifth,alerts%20they%20receive%20are%2C%20in%20fact%2C%20false%20positives.\" target=\"_blank\" rel=\"noopener\">Institute of Data<\/a>, false positives faced by IT and security teams are:<\/p><h3>3.1. False positives about network anomalies<\/h3><p>These take place when network monitoring tools identify normal or harmless network activities as suspicious or malicious, such as false alerts for network scans, legitimate file sharing, or background system activities.<\/p><h3>3.2. False malware positives<\/h3><p>Antivirus software often identifies benign files or applications as potentially malicious. This can happen when a file shares similarities with <a href=\"https:\/\/pandorafms.com\/blog\/ransomware\/\" target=\"_blank\" rel=\"noopener\">known malware<\/a> signatures or displays suspicious behavior. A cybersecurity false positive in this context can result in the blocking or quarantine of legitimate software, causing disruptions to normal operations.<\/p><h3>3.3. False positives about user behavior<\/h3><p>Security systems that monitor user activities can generate a cybersecurity false positive when an individual\u2019s actions are flagged as abnormal or potentially malicious. Example: an employee who accesses confidential documents after working hours, generating a false positive in cybersecurity, even though it may be legitimate.<\/p><p>False positives can also be found in email security systems. For example, spam filters can misclassify legitimate emails as spam, causing important messages to end up in the spam folder. Can you imagine the impact of a vitally important email ending up in the Spam folder?<\/p><h2 id=\"4\">4. Consequences of Alert Fatigue<\/h2><p>Alert Fatigue has consequences not only on the IT staff themselves but also on the organization:<\/p><h3>4.1. False sense of security<\/h3><p>Too many alerts can lead the IT team to think they are false positives, leaving out the actions that could be taken.<\/p><h3>4.2. Late Response<\/h3><p>Too many alerts overwhelm IT teams, preventing them from reacting in time to real and critical risks. This, in turn, causes costly remediation and even the need to allocate more staff to solve the problem that could have been avoided.<\/p><h3>4.3. Regulatory non-compliance<\/h3><p>Security breaches can lead to fines and penalties for the organization.<\/p><h3>4.4. <a href=\"https:\/\/pandorafms.com\/blog\/digital-reputation\/\" target=\"_blank\" rel=\"noopener\">Reputational damage to the organization<\/a><\/h3><p>A breach of the company\u2019s security gets disclosed (and we\u2019ve seen headlines in the news) and impacts its reputation. This can lead to loss of customer trust\u2026 and consequently less revenue.<\/p><h3>4.5. IT staff work overload<\/h3><p>If the staff in charge of monitoring alerts feel overwhelmed with notifications, they may experience increased job stress. This has been one of the causes of lower productivity and high staff turnover in the IT area.<\/p><h3>4.6. Deterioration of morale<\/h3><p>Team demotivation can cause them to disengage and become less productive.<\/p><h2 id=\"5\">5. How to avoid these Alert Fatigue problems?<\/h2><p>If alerts are designed before they are implemented, they become useful and efficient alerts, in addition to saving a lot of time and, consequently, reducing alert fatigue.<\/p><h3>5.1. Prioritize<\/h3><p>The best way to get an effective alert is to use the \u201cless is more\u201d strategy. You have to think about the absolutely essential things first.<\/p><ul class=\"lista\"><li>What equipment is absolutely essential? Hardly anyone needs alerts on test equipment.<\/li><li>What is the severity if a certain service does not work properly? High impact services should have the most aggressive alert (level 1, for example).<\/li><li>What is the <strong>minimum<\/strong> that is needed to determine that a computer, process, or service is not working properly?<br \/>Sometimes it is enough to monitor the connectivity of the device, some other times something more specific is needed, such as the status of a service.<\/li><\/ul><p>Answering these questions will help us find out what the most important alerts are that we need to act on immediately.<\/p><h3>5.2. Avoiding false positives<\/h3><p>Sometimes it can be tricky to get alerts to only go off when there really is a problem. Setting thresholds correctly is a big part of the job, but more options are available. Pandora FMS has several tools to help avoid false positives:<\/p><h4>Dynamic thresholds<\/h4><p>They are very useful for adjusting the thresholds to the actual data. When you enable this feature in a module, Pandora FMS analyzes its data history, and automatically modifies the thresholds to capture data that is out of the ordinary.<\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-umbrales-3.png\" width=\"594\" height=\"380\" \/><\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-umbrales-1.png\" width=\"598\" height=\"192\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-umbrales-6.png\" width=\"590\" height=\"357\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-umbrales-5.png\" width=\"600\" height=\"288\" \/><\/p><ul class=\"lista\"><li><strong>FF Thresholds:<\/strong> Sometimes the problem is not that you did not correctly define the alerts or thresholds, but that the metrics you use are not entirely reliable. Let\u2019s say we are monitoring the availability of a device, but the connection to the network on which it is located is unstable (for example, a very saturated wireless network). This can cause data packets to be lost or even there are times when a ping fails to connect to the device despite being active and performing its function correctly. For those cases, Pandora FMS has the FF Threshold. By using this option you may configure some \u201ctolerance\u201d to the module before changing state. Thus, for example, the agent will report two consecutive critical data for the module to change into critical status.<\/li><li><strong>Use maintenance windows:<\/strong> Pandora FMS allows you to temporarily disable alerting and even event generation of a specific module or agent with the Quiet mode. With maintenance windows (Scheduled downtimes), this can be scheduled so that, for example, alerts do not trigger during X service updates in the early hours of Saturdays.<\/li><\/ul><h3>5.3. Improving alert processes<\/h3><p>Once they have made sure that the alerts that are triggered are the necessary ones, and that they will only trigger when something really happens, you may greatly improve the process as follows:<\/p><ul class=\"lista\"><li><strong>Automation:<\/strong> Alerting is not only used to send notifications; it can also be used to automate actions. Let\u2019s imagine that you are monitoring an old service that sometimes becomes saturated, and when that happens, the way to recover it is to just restart it. With Pandora FMS you may configure the alert that monitors that service to try to restart it automatically. To do this, you just need to configure an alert command that, for example, makes an API call to the manager of said service to restart it.<\/li><li><strong>Alert escalation:<\/strong> Continuing with the previous example, with alert escalation you may make the first action performed by Pandora FMS, when the alert is triggered, to be the restart of the service. If in the next agent run, the module is still in critical state, you may configure the alert so that, for example, a ticket is created in Pandora ITSM.<\/li><li><strong>Alert thresholds:<\/strong> Alerts have an internal counter that indicates when configured actions should be triggered. Just by modifying the threshold of an alert you may go from having several emails a day warning you of the same problem to receiving one every two or three days.<\/li><\/ul><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-fatiga-alertas-01.png\" width=\"1213\" height=\"192\" \/><\/p><p>This alert (executed daily) has three actions: at first, it is about restarting the service. If at the next alert execution, the module has not been recovered, an email is sent to the administrator, and if it has not yet been solved, a ticket is created in Pandora ITSM. If the alert remains triggered on the fourth run, a daily message will be sent through Slack to the group of operators.<\/p><h3>5.4. Other ways to reduce the number of alerts<\/h3><ul class=\"lista\"><li><strong>Cascade Protection<\/strong> is an invaluable tool in setting up efficient alerting, by skipping triggering alerts from devices dependent on a parent device. With basic alerting, if you are monitoring a network that you access through a specific switch and this device has a problem, you will start receiving alerts for each computer on that network that you can no longer access. On the other hand, if you activate cascade protection on the agents of that network (indicating whether they depend on the switch), Pandora FMS will detect that the main equipment is down, and will skip the alert of all dependent equipment until the switch is operational again.<\/li><li><strong>Using services<\/strong> can help you not only reduce the number of alerts triggered, but also the number of alerts configured. If you have a cluster of 10 machines, it may not be very efficient to have an alert for each of them. Pandora FMS allows you to group agents and modules into Services, along with hierarchical structures in which you may decide the weight of each element and alert based on the general status.<\/li><\/ul><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Captura-fatiga-alertas-02.png\" width=\"940\" height=\"579\" \/><\/p><h3>5.5. Implement an Incident Response Plan<\/h3><p>Incident response is the process of preparing for cybersecurity threats, detecting them as they arise, responding to quell them, or mitigating them. Organizations can manage threat intelligence and mitigation through incident response planning. It should be remembered that any organization is at risk of losing money, data, and reputation due to cybersecurity threats.<\/p><p>Incident response requires assembling a team of people from different departments within an organization, including organizational leaders, IT staff, and other areas involved in data control and compliance. The following is recommended:<\/p><ul class=\"lista\"><li>Plan how to analyze data and networks for potential threats and suspicious activity.<\/li><li>Decide which incidents should be responded to first.<\/li><li>Have a plan for data loss and finances.<\/li><li>Comply with all applicable laws.<\/li><li>Be prepared to submit data and documentation to the authorities after a violation.<\/li><\/ul><p>Finally, a timely reminder: incident response became very important starting with <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=dde1034ef3838cd4JmltdHM9MTcwOTg1NjAwMCZpZ3VpZD0yOWQ2MDg0Zi1jODBmLTYyODQtM2IxNy0xOTNmYzk0ZTYzMmUmaW5zaWQ9NTIxOA&amp;ptn=3&amp;ver=2&amp;hsh=3&amp;fclid=29d6084f-c80f-6284-3b17-193fc94e632e&amp;psq=gdpr&amp;u=a1aHR0cHM6Ly9nZHByLWluZm8uZXUv&amp;ntb=1\" target=\"_blank\" rel=\"noopener\">GDPR<\/a> with extremely strict rules on non-compliance reporting. If a specific breach needs to be reported, the company must be aware of it within 72 hours and report what happened to the appropriate authorities. A report of what happened should also be provided and an active plan to mitigate the damage should be presented. If a company does not have a predefined incident response plan, it will not be ready to submit such a report.<\/p><p>The GDPR also requires to know if the organization has adequate security measures in place. Companies can be heavily penalized if they are scrutinized after the breach and officials find that they did not have adequate security.<\/p><h2>Conclusion<\/h2><p>The high cost to both IT staff (constant turnover, burnout, stress, late decisions, etc.) and the organization (disruption of operations, security breaches and breaches, quite onerous penalties) is clear. While there is no one-size-fits-all solution to prevent over-alerting, we do recommend prioritizing alerts, avoiding false positives (dynamic and FF thresholds, maintenance windows), improving alerting processes, and an incident response plan, along with clear policies and procedures for responding to incidents, to ensure you find the right balance for your organization.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Talking about too many cybersecurity alerts is not talk [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,1273,61],"tags":[475,1272],"class_list":["post-76457","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-1273","category-press-release","tag-pandorafms","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is alert fatigue and its effect on IT monitoring? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pandorafms.com\/blog\/alert-fatigue\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is alert fatigue and its effect on IT monitoring? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Talking about too many cybersecurity alerts is not talk [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pandorafms.com\/blog\/alert-fatigue\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-29T07:51:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What is alert fatigue and its effect on IT monitoring?\",\"datePublished\":\"2024-03-29T07:51:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\\\/\"},\"wordCount\":2372,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Portada-Fatiga-alertas.jpg\",\"keywords\":[\"Pandorafms\",\"2024\"],\"articleSection\":[\"PandoraFMS\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\\\/\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/\",\"name\":\"What is alert fatigue and its effect on IT monitoring? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Portada-Fatiga-alertas.jpg\",\"datePublished\":\"2024-03-29T07:51:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Portada-Fatiga-alertas.jpg\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Portada-Fatiga-alertas.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/alert-fatigue\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is alert fatigue and its effect on IT monitoring?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is alert fatigue and its effect on IT monitoring? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/","og_locale":"zh_HK","og_type":"article","og_title":"What is alert fatigue and its effect on IT monitoring? - Version 2","og_description":"Talking about too many cybersecurity alerts is not talk [&hellip;]","og_url":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/","og_site_name":"Version 2","article_published_time":"2024-03-29T07:51:52+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"13 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What is alert fatigue and its effect on IT monitoring?","datePublished":"2024-03-29T07:51:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\/"},"wordCount":2372,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg","keywords":["Pandorafms","2024"],"articleSection":["PandoraFMS","2024","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pandorafms.com\/blog\/alert-fatigue\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/what-is-alert-fatigue-and-its-effect-on-it-monitoring\/","url":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/","name":"What is alert fatigue and its effect on IT monitoring? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#primaryimage"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg","datePublished":"2024-03-29T07:51:52+00:00","breadcrumb":{"@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pandorafms.com\/blog\/alert-fatigue\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2024\/03\/Portada-Fatiga-alertas.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pandorafms.com\/blog\/alert-fatigue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What is alert fatigue and its effect on IT monitoring?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jTb","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=76457"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76457\/revisions"}],"predecessor-version":[{"id":76546,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76457\/revisions\/76546"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=76457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=76457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=76457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}