Now that we’ve had some time to recover from last week’s Microsoft Azure outage, we can look back and ask, “What happened?!” Microsoft has released a Root Cause Analysis (RCA) explaining the incident, but what else have we learned from the incident? Below are three key takeaways from the event. Public cloud providers aren’t immune to outages We’ve said it before and we’ll say it again, but no one is immune to downtime. It can happen to anyone, anywhere. Even with …

Will you be in the Indianapolis area this week? Be sure to check out the Indianapolis IT Symposium on September 12! It’s a great opportunity to stay on top of current technology trends, network with thousands of your peers, and share knowledge through keynote and breakout sessions. While you’re there, be sure to visit us at our table! We’d love to show you how to modernize your IT, transform your organization and grow your business with the help of our …

If you tried to catch up from Labor Day weekend by opening your Office 365 email this morning and found your computer still seemed to be in holiday mode, there’s a reason for that. According to a couple of different reports, one of Microsoft’s Texas data centers has suffered an outage due to a spike in internal temperature, causing a shutdown of servers hosted there. The shutdown was automatically initiated after local temperatures exceeded the set threshold so asto prevent …

What is ISO 27001 compliance?

Posted on August 21, 2018 by

First introduced in 2005, the ISO family of standards for managing information security has received more attention lately in the wake of increasing data breaches and security lapses. However, they’re still not as popular as HITRUST or SOC 2 audits, so in this post, we’ll specifically discuss ISO 27001, who it affects and what compliance means for your organization. What is ISO 27001? ISO 27001 is a compliance regulation such as PCI or HIPAA. There are about a dozen standards within …

When you think of a security threat, what comes to mind? A ransomware attack? A thief drilling into your vault and stealing your money? An unpatched vulnerability that could expose sensitive data? While all of these threats represent external forces, it’s just as important to remember your internal threats, too. In this post, we’ll discuss a few ways you can stay on top of insider threats to your organization’s data and reputation and take appropriate steps to protect your employees–not …

As we look ahead to 2019 and that all-important “year of the future” 2020, what’s ahead for cloud computing? What should organizations be on the lookout for? Cloud goes all in Sooner or later, the bandaid of moving systems over piecemeal has to come off. Whenever possible, organizations are moving away from the lift-and-shift strategy and looking to refactor or rebuild entirely, according to Gartner. More than half of enterprises already using cloud now will have an “all-in” cloud strategy …

When we talk about disaster recovery, everyone says they want high resiliency. It’s definitely a trendy buzzword. But what does that mean exactly? What is high resilience? Well, the simplest definition would be “it never goes down.” But there’s a lot more to it than that, and as we’ll explore in this post, you may discover that high resiliency doesn’t necessarily mean “it never goes down.” According to the Merriam-Webster dictionary, resilience means: a : capable of withstanding shock without …

Note: This is a guest blog post by Kurt Schaldenbrand, Online Tech’s Product Design Manager. You’ve made the choice to modernize your IT infrastructure and migrate from your legacy systems to a new, more optimal environment. Now what? How do you move your mission-critical applications without losing information or disrupting day-to-day operations while the process completes? Who will create and manage the overall migration plan? Who will monitor the migration and respond to issues as they come up? When it’s …

Now that we’ve had half a year to process the Spectre and Meltdown flaws released in January, what’s been done about it? Are we now “safe” or are there other CPU flaws out there that we just don’t know about? Unfortunately, there’s always the risk of as-yet unknown vulnerabilities that could be exploited for malicious purposes. But in the meantime, security researchers and other organizations are working hard on fixes to make the Internet (and in this case, computer architecture itself) …

If you’re in Indianapolis on July 10, be sure to stop by the VMUG (VMware User Group) conference! What is the VMUG conference about?  VMUG usercons are created by VMWare uses specifically for VMWare users, which presents a great opportunity to meet with experts and peers in the area. During the conference, you can expect to: Connect with hundreds of VMware users in your area Attend educational sessions on the latest industry trends and topics Get an inside look at …

Get started now. Exceptional service awaits.

Live Chat