Next Wednesday, Online Tech heads to Detroit, Michigan to join the region’s Fortune 1000 CIOs while exhibiting secure hosting solutions, including the encrypted cloud, at Evanta’s 11th Annual Detroit Executive Summit at the Sheraton Detroit Novi Hotel. The summit is hosted by the Technology and Business Innovation Forum (TBIF) of the Stephen M. Ross School of Business at the University of Michigan, as well as Detroit’s Society for Information Management (SIM). Built “by CIOs, for CIOs,” the event features a number of sessions and keynotes on …

The Dept. of Health & Human Services has a HIPAA security guide outlining their recommendations for securing ePHI (electronic protected health information) on mobile devices, including remote access. The HHS covers ePHI in a variety of instances ranging from accessing, storing and transmitting data. Their format presents a potential risk, then the technical, administrative or physical security recommendation to prevent said risk. Below I’ve summarized their guide to highlight some of the top pointers along with some additional technical info: …

Although the updated Adobe hack number was last reported at 38 million users, Paul Ducklin of Sopho’s Naked Security blog has reported 150 million breached records have been found in a database dump online. While the passwords are encrypted, plaintext password hints have also been published alongside each record. However, the database dump doesn’t include any of the 2.9 million sencrypted credit and debit cardholder data that was also stolen in breach. Why is this such a serious breach? As I …

Results from the 2013 IDG Enterprise Cloud Computing report found that the percent of total IT environment to be moved to the private cloud grew from 28 to 36 percent, with a lower TCO (total cost of ownership) being the top internal selling point for those surveyed (23 percent). The report included surveyed readers of CIO, Computerworld, CSO, InfoWorld, ITworld, and Network World. Other top arguments for using the private cloud include the ability to enable business continuity (20 percent); …

Last week I wrote about CryptoLocker in Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker, the well-known malware that is categorized as ‘ransomware’ – it encrypts files on your computer and refuses to decrypt until you pay the malware authors a fee. To help combat the malware spread, CIS (Center for Internet Security) released some pointers for organizations concerned about possible infection: Block traffic to a number of IP addresses at your network perimeter devices to prevent the malware from getting …

2013 Mobile Security: BYOD Resource Roundup

Posted on November 11, 2013 by

Here’s the best of mobile security from 2013, including articles, white papers, previously recorded webinars and more that explain mobile health IT (mHealth) data security and how to prevent compromised data in your organization. Online Tech is also headed to the 2013 mHealth Summit this December in Washington, D.C. to exhibit encrypted HIPAA hosting solutions for mobile software as a service (SaaS) and other health IT companies. Visit us at booth #1112 if you’re attending, and follow us @OnlineTech on …

Yesterday, I blogged about the new PCI DSS 3.0 document that contains a number of clarifications, additional guidance and evolving (new) requirements. The part I’m going to focus on is the evolving requirements, as they represent the changes that ensure that the standards are up to date with emerging threats and changes in the market. They also represent the greatest changes between the old and new documents, and are relevant to merchants and service providers that are already PCI DSS …

The new PCI DSS 3.0 document contains a number of clarifications, additional guidance and evolving requirements, according to how the PCI SSC refers to the changes. The part I’m going to focus on is the evolving requirements, as they represent the changes that ensure that the standards are up to date with emerging threats and changes in the market. They also represent the greatest changes between the old and new documents, and are relevant to merchants and service providers that …

According to the 2013 Bit9 Server Security Survey Report, 55 percent of IT and security professionals’ top server security concerns include targeted attacks and data breaches on their servers. Another 26 percent report they have been hit by advanced malware, up from 2011 when only 17 percent reported the same. When it comes to which kind of servers pose the highest risk, 52 percent said web servers, with file servers and email servers trailing behind at 12 and 11 percent, …

Online Tech is hiring for a variety of new positions, with the latest being Director of Marketing – check out the other listings and more positions on our Careers page. Now hiring: Director of Marketing Help grow the client base for one of the fastest growing, most highly-regarded high tech companies in the Midwest. As the Director of Marketing, you will be responsible for developing and implementing marketing strategies that deliver sales leads and prospective clients to our sales team. …

Get started now. Exceptional service awaits.

Live Chat