There’s been a lot of buzz around the idea of Software Defined Everything, and it’s considered the next “big thing” in IT. Is your organization ready for the promises of a software-defined world? If not, what do you need to consider to be prepared? What is Software Defined Everything? It’s an overarching term that includes software-defined networking, (SDN) storage, (SDS) and data centers (SDDC). It is also called Software Defined Infrastructure or SDx (Software-Defined Anything). With the infrastructure virtualized and …

Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. The healthcare industry is a particularly attractive target, because hospital systems are often vulnerable and the critical nature of patient data means they are more likely to pay out than risk being locked out of their files. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 …

More and more industries, from higher ed to transportation, are adopting the cloud and the endless number of possibilities it provides. This has led to the development of the next-generation cloud, known as X as a Service. XaaS, where X stands for anything, is a single service or collection of services that are delivered to the client over the internet. The most common examples are software (SaaS), infrastructure (IaaS), and platform (PaaS), but virtually every layer of the IT stack …

What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would discover more than 100 variants before year’s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, …

Top data breaches from 2016

Posted on December 23, 2016 by

In a world where the Internet of Things is growing exponentially, attackers are exploiting vulnerabilities in systems every day, and data breaches are constantly announced, cybersecurity has been top of mind. Here’s a look at some of the biggest data breaches from 2016 as well as some honorable mentions from 2015. Yahoo: The company suffered two breaches this year, announcing thefts in September and December. The latest breach may be the biggest of all time, as Yahoo is estimating 1 …

Online Tech has officially joined more than 1,100 organizations who are compliant with the new EU-US Privacy Shield law, the replacement for the US-EU Safe Harbor Framework. Developed by the Department of Commerce and the European Commission, Privacy Shield is the response to European concern about excessive government access to data and a lack of process for citizens to file privacy complaints. Privacy Shield allows for the transfer of data between the US and the European Union and implements seven …

As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

How are you fighting Shadow IT?

Posted on November 9, 2016 by

If you’ve found yourself pulling your hair out over Shadow IT, you’re certainly not alone. But there’s no need to stress yourself to death! Here’s why all is not lost if you’re struggling with aligning your IT department with other LOBs: Shadow IT brings to the forefront the very real problem of control vs consumption. If you’re attempting a traditional control-based approach to governing the applications other departments in your business use, take a step back and consider your operation …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

Get started now. Exceptional service awaits.

Live Chat