Join Online Tech at ITEXPO

Posted on January 29, 2019 by

Who’s ready to get away from the winter weather? We sure are! We’ll be at the ITEXPO event in Fort Lauderdale, FL from Jan. 29 through Feb. 1! According to the ITEXPO website, the conference is in its 20th year. It’s a place where telecom and IT professionals; C-level executives,  business owners, developers, and the channel partners all gather to learn in-conference sessions and conduct business on the show floor. It is the annual meeting point in South Florida where …

Did you know that today is Data Privacy Day? It’s an international holiday that occurs every year on the 28th of January, and whose purpose is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, Israel and 47 European countries. Data privacy these days has become a hot topic of discussion, what with GDPR recently being enforced on major companies like Facebook and Google, Marriott/Starwood’s disclosure of up to 500 million …

We’re headed out to sunny Phoenix, Arizona for the IT Nation Evolve Q1 meetings! This is a very unique event that has quarterly meetings throughout the year. Specifically designed for service providers, members are divided into peer groups and work with assigned group facilitators to engage in collaborative and informative group sessions throughout each event. Online Tech will be hosting a lunch and learn session on Tuesday, January 29, to help service providers meet our team and understand how we …

Everyone has been talking about artificial intelligence (AI) right now and the potential uses it has for civilization. Or, is everyone buzzing about machine learning? Are these ideas the same thing? If not, what’s the difference? In this post, we’ll explore just that. Artificial Intelligence (AI) AI has roots going back to the 1950s, when John McCarthy (widely regarded as the father of AI) and other researchers first came up with a definition for the concept. They defined AI as …

It’s the new year! Time to break out the old pad and paper for some new years resolutions. If one of your company goals this year is to improve your security posture (a worthy goal for any organization), here are three smaller resolutions you can keep to help you do just that: If you don’t already, use two factor or multi-factor authentication (TFA or MFA) instead of just a password for restricted access. The benefits of multi/two-factor authentication can’t be …

Top 5 data breaches of 2018

Posted on December 27, 2018 by

It’s that time of year again where we look back on 2018 and review the biggest data breaches that occurred. Without any further ado, let’s get started. USPS: 60 million In November, the United States Postal Service announced it had fixed a security weakness  that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf. That type of weakness presented a huge opportunity …

We’re excited to announce that on December 1, we officially acquired the cloud assets, infrastructure and locations of Neverfail, an IT services provider based in Austin, Texas! This acquisition ensures our commitment to growth in the cloud services arena. As a result, we are well positioned to become one of the most respected providers of private, hybrid and multi-cloud solutions in the marketplace! In addition to our current multi-cloud, colocation, data protection, managed services, compliance and security solution portfolio, we’re pleased …

As Black Friday, Cyber Monday and all those great deals come barreling down upon us (or are already here in the case of some retailers), now is a prudent time to remember how to shop online safely. The holiday season is unfortunately a prime time for phishing emails, spoofed sites and other scams, so we thought we’d quickly review some tips to help you stay safe this holiday season. This post is an excerpt from our post last year–6 Ways …

IT infrastructure, what we’ve all come to know and love (or hate, depending on your viewpoint) is the driving force behind all of our machines. What if it were to be so widely available that you didn’t even have to think about it when building a program? In a less dramatic sense, this is the definition behind invisible infrastructure. History Remember back in the day when personal computer commercials used to say “powered by a 6 core processor with a …

National Cyber Security Awareness Month (NCSAM) may be ending soon, but that doesn’t mean you can or should forget about cybersecurity and go back to your daily lives, right? Right. In this post, we’ll be talking about an important cybersecurity problem that has become an issue worldwide: Security (or lack thereof) of IoT devices. We’ve addressed this issue before but we think it’s worth calling out again because it is so important. Everything from your watch to your fridge can be …

Get started now. Exceptional service awaits.

Live Chat