Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would discover more than 100 variants before year’s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, …

The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Encryption is becoming more and more a part of our personal and professional lives. One could even argue that we can’t live without it. In fact, it’s become so standardized that Amazon recently announced it was bringing back encryption to its Kindle Fire tablet after removing it in a previous version and hearing customer complaints. And with all the media coverage surrounding Apple’s latest encryption fight, it’s safe to say it’s at the forefront of security-related minds. Encryption, which typically uses an …

We’ve already talked about the need to invest in an IT security budget as a best practice for business. Whether that’s an alarm for the door, a safe to guard money, or a firewall behind its network systems, security helps people and organizations sleep better at night. But even with a lock on the door, burglars can still find a way to get in. The same goes for the security of your data. We’ve all heard of the data breaches of Target, …

Encryption has been widely talked about as one of the best tools to protect you against potential attacks on your data. For many companies processing credit card payments, encrypting data is required for compliance with standards such as PCI DSS and individual state laws. But if you’re in the healthcare industry, it’s even more important because it’s not required for hipaa compliance. What is encryption? It takes your data and codes it using a series of mathematical formulas to render …

As we all take a step back to reminisce about the past year and drop the ball on a new one, those of us at Online Tech have plenty of achievements to celebrate. We’ve called this, our 20th year of existence, “the most ambitious and successful 12 months” in the company history in a recent press release. That’s notable, considering our 20th anniversary story about how we’ve evolved from being Michigan’s first ISP in 1994 to a leader in secure …

After 30 years in the disaster recovery field, Lance Thompson has some good stories to tell. The founder and president of Baseline Data Services shared a few of them – along with plenty more pertinent facts and advice – during a recent installment of the Online Tech “Tuesdays at Two” webinar series. Listed below are three paraphrased stories from “Lessons Learned From the Disaster Recovery Trenches,” and a quick recap of the messages behind each story. If you’re interested in …

For 15 years, Online Tech has provided data backup services to our colocation and hosting clients. We used to back up to tapes in a large multi-tape system, then transport them from one data center to another. We moved to disk-based backup when the total cost to operate per GB of protected data using the disk was clearly less than tape. We knew we had to find a new way with a lower total cost of ownership (TCO) if we …

Want to learn more about five tools that can help protect patient data? Online Tech Director of Healthcare IT April Sage will be part of a panel presenting “5 Key Tools to Help Your Organization Achieve HIPAA Compliance” via webinar on Tuesday, Oct. 21. The 90 minute webinar begins at 2 p.m. ET. (Register here.) BlogHipaa.com presented the five tools in a recent post, citing tips from representatives of organizations in each area. Now those industry experts will co-present a …

There’s a new leader on the U.S. Department of Health & Human Services’ Wall of Shame. A hacking group known as “APT 18” is suspected of stealing names, Social Security numbers, addresses, birthdays and telephone numbers from 4.5 million patients of Community Health Systems, a network of 206 hospitals across 29 states (see map at right). Credit card numbers and medical records were not accessed. It’s the largest attack involving patient information since the HHS started tracking HIPAA breaches in …

Get started now. Exceptional service awaits.

Live Chat