Follow Us
White Papers
Want to stay informed on all things Online Tech?
Sign up to receive compliant and secure hosting resources now!
View our Privacy Policy.
Informative Videos
Categories
- CEO Voices
- Cloud Computing
- Data Centers
- Disaster Recovery
- Encryption
- HIPAA Compliance
- Information Technology Tips
- Managed Servers
- Michigan Colocation
- Michigan Data Center
- Michigan Data Centers
- Mobile Security
- Online Data Storage
- Online Tech News
- PCI Compliance
- SaaS Hosting
- Safe Harbor
- SAS 70/SSAE 16/SOC
- Uncategorized
Data Encryption Series
About Online Tech
Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.
Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.
Backed by independent HIPAA, PCI, SAS 70, SSAE 16, SOC 2, and SOC 3 audits, Online Tech delivers the security, privacy, and availability expected from world class data center operators.
For more information, call (734) 213-2020 or email contactus@onlinetech.com.
Tag: two-factor authentication
Staying ahead of the cloud cybersecurity curve
For the upcoming IMN Data Center East Conference, I’ve been invited to speak on the panel called “Staying Ahead of the Curve on Services” about managed services for data center operators. From my experience, two of the highest value managed … Continue reading
Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks
Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That’s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we’re exhibiting our HIPAA hosting solutions at booth #501. Here’s our takeaways from a session … Continue reading
Celebrating National Cyber Security Awareness Month (NCSAM)
October is National Cyber Security Awareness Month (NCSAM), celebrated annually to highlight awareness about online security for consumers, small and medium-sized businesses (SMBs), corporations, educational institutions and young people nationwide. NCSAM will focus on different aspects of online security, including … Continue reading
PCI DSS Data Breaches Increase 15 Percent; Remote Access & SQL Injections to Blame
A few major takeaways from Trustwave’s 2013 Global Security Report reveal that the retail industry was at the top of data breach investigations at 45 percent. A total of 96 percent of customer records (payment card data, PII (personally identifiable … Continue reading
2013 Global InfoSec Spending to Hit $64.4 Billion
Global spending on information security is expected to total $64.4 billion this year with an average annual growth rate of 8.7 percent over the next four years, according to Lawrence Pingree, research director at Gartner, as reported by USAToday.com. Information … Continue reading
Why Authentication is the Answer to Your Cloud Worries
The following is a guest blog from Ann Arbor-based Duo Security‘s Security Evangelist, Mark Stanislav: A recent article from Forbes titled, “Is Your Investment In Security Really Worth It?”, called into question whether or not the money spent for information security … Continue reading
Chain of Trust: Importance of Vetting Third-Party Security
While you may think your organization has all of the appropriate technical, physical and administrative security in place to guard against a data breach, what about your third-party vendors and additional web-based software that you use on your website or … Continue reading
HIPAA Security Lessons from a Michigan Healthcare CIO
HealthITSecurity.com recently conducted an interview with Frank Fear, CIO of Memorial Hospital in Michigan, a medium-sized healthcare organization with approximately 1,000 desktops to manage. Learn from his lessons and a few from us to create a completely secure and efficient … Continue reading
Achieving a Layered Data Security Solution for PCI DSS Compliance
For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you … Continue reading
Health IT Security: Raising the Bar to Protect PHI
The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a … Continue reading