Considering a move to a cloud-based infrastructure? You’ll want to join Online Tech at TechEx | Fall 2014 on Wednesday, Oct. 29, at Ford Field in downtown Detroit. One of Michigan’s premier technology events, TechEx is hosted by Data Strategy, an advanced IT solutions and support company headquartered in Grand Rapids and with locations in Detroit and Indianapolis. (Strikingly similar to Online Tech’s footprint that includes a Metro Detroit location among four Michigan data centers and one Indiana data center, …

The American Health Information Management Association (AHIMA) is holding its 86th annual convention and exhibit in San Diego this week. This year’s theme is “Leading the Way to Health Intelligence” and its schedule of events is designed to address the challenges and opportunities healthcare professionals face now and in the future. Cloud computing presents many of those challenges and opportunities, so Online Tech has gotten in on the fun. At 8 a.m. Wednesday, Online Tech Director of Healthcare IT April …

Michigan HIMSS 2014 Fall Conference

Posted on September 12, 2014 by

Online Tech rarely misses an opportunity to attend a HIMSS event, which are always packed with healthcare information management hot button topics and innovative ideas. So we’re particularly eager for next week’s Michigan HIMSS Chapter 2014 Fall Conference in Plymouth Township, just minutes from our Ann Arbor headquarters and three of our four Michigan data centers. The theme for the Sept. 16-17 event is “Health Information Technology: The Vision and the Value” and it will be held at The Inn …

Hold Security, a firm credited with uncovering significant data breaches – such as the one at Adobe Systems in October 2013 – has uncovered a record-breaking hack of 1.2 billion username and passwords from multiple websites. From the Hold Security website: After more than seven months of research, Hold Security identified a Russian cyber gang which is currently in possession of the largest cache of stolen data. While the gang did not have a name, we dubbed it “CyberVor” (“vor” …

As another large U.S. retailer – this time restaurant chain P.F. Changs – suffers the impact of a data breach, results of a survey released Thursday show that consumers are firmly holding retailers responsible at a rate nearly that of the cyber criminals themselves. According to reports, thousands of credit and debit cards used at P.F. Chang’s between March and May are now for sale on an underground store. The chain told KrebsOnSecurity.com that it has not confirmed a card …

When the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy & Data Security was released earlier this month, it stated that use of cloud services is the second-highest security risk concern for healthcare organizations. Employee negligence was the runaway winner in that category, mentioned by 75 percent of leaders interviewed for the study. Cloud services (41 percent) was bunched in a tight race for second-place with mobile device insecurity (40 percent) and cyber attackers (39 percent). According to the …

The automotive capital of the world has “quietly become a leader among the nation’s technology economies,” says an Automation Alley’s 2014 Technology Industry Report released today. According to media reports, the study shows Metro Detroit tech industry employment is up 15 percent (approximately 30,000 jobs) compared to last year, making it the largest tech hub in the Midwest. The growth rate significantly eclipses more traditional technology regions like Silicon Valley, which lost 4 percent (approximately 10,000 jobs) of its employment …

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more information on IT disaster recovery, download disaster recovery white paper or check out our case studies. BUSINESS CONTINUITY Within a business continuity plan exists a few steps: Business Impact Analysis (BIA) This involves determining the operational and financial impact of a potential disaster or disruption, including loss of sales, credibility, compliance fines, legal fees, PR management, etc. It …

Criminal attacks on healthcare systems have risen 100 percent over the past four years, according to the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy and Data Security. When the Traverse City, Mich.-based institute first conducted the study in 2010, 20 percent of senior employees at healthcare organizations across the country reported attacks on sensitive data. That number rose to 40 percent in 2014. Despite the uptick in cyber attacks, the report indicates that the total number of data …

Here we go patting ourselves on the back again, but we can’t help it. Media outlets keep handing us awards! Most recently, CRN named Online Tech one of its MSP Hosting Service Provider 100. (Read full press release.) These 100 companies are a subset of CRN’s Managed Service Provider 500 list, which it hails as “the top technology providers and consultants in North America whose forward-thinking approach to providing managed services is changing the landscape of the IT channel.” The …

Get started now. Exceptional service awaits.

Live Chat