Top data breaches from 2016

Posted on December 23, 2016 by

In a world where the Internet of Things is growing exponentially, attackers are exploiting vulnerabilities in systems every day, and data breaches are constantly announced, cybersecurity has been top of mind. Here’s a look at some of the biggest data breaches from 2016 as well as some honorable mentions from 2015. Yahoo: The company suffered two breaches this year, announcing thefts in September and December. The latest breach may be the biggest of all time, as Yahoo is estimating 1 …

Online Tech has officially joined more than 1,100 organizations who are compliant with the new EU-US Privacy Shield law, the replacement for the US-EU Safe Harbor Framework. Developed by the Department of Commerce and the European Commission, Privacy Shield is the response to European concern about excessive government access to data and a lack of process for citizens to file privacy complaints. Privacy Shield allows for the transfer of data between the US and the European Union and implements seven …

As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

How are you fighting Shadow IT?

Posted on November 9, 2016 by

If you’ve found yourself pulling your hair out over Shadow IT, you’re certainly not alone. But there’s no need to stress yourself to death! Here’s why all is not lost if you’re struggling with aligning your IT department with other LOBs: Shadow IT brings to the forefront the very real problem of control vs consumption. If you’re attempting a traditional control-based approach to governing the applications other departments in your business use, take a step back and consider your operation …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

Online Tech recently hosted a webinar on virtual private clouds and how they help your business. Our panelists were Aaron Lake, senior solutions architect, and Kurt Schaldenbrand, product design manager. Together, they have more than 40 years of experience designing and building applications for a variety of platforms and were happy to lend their expertise. Schaldenbrand and Lake gave a comprehensive overview of Online Tech’s virtual private cloud offering and how the easy self-serve options within the client portal, OTPortal, …

As we get more devices and connect them to the cloud, it’s only natural that the rise of user-centric computing should follow. What is that, and what effect does it have on the IT industry? Let’s start with defining user-centric computing. According to OneStopClick, “A user-centric computing system is a ubiquitous system consisting of information and devices that users can access anytime and anywhere.” Wikipedia says, “The chief difference from other product design philosophies is that user-centered design tries to optimize the …

Get started now. Exceptional service awaits.

Live Chat