More and more industries, from higher ed to transportation, are adopting the cloud and the endless number of possibilities it provides. This has led to the development of the next-generation cloud, known as X as a Service. XaaS, where X stands for anything, is a single service or collection of services that are delivered to the client over the internet. The most common examples are software (SaaS), infrastructure (IaaS), and platform (PaaS), but virtually every layer of the IT stack …

What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

As we get more devices and connect them to the cloud, it’s only natural that the rise of user-centric computing should follow. What is that, and what effect does it have on the IT industry? Let’s start with defining user-centric computing. According to OneStopClick, “A user-centric computing system is a ubiquitous system consisting of information and devices that users can access anytime and anywhere.” Wikipedia says, “The chief difference from other product design philosophies is that user-centered design tries to optimize the …

The growing number of devices connected to the Internet of Things or IoT, provides an endless number of possibilities for our world. But as more and more devices come out, it’s impossible to ignore the security of them. One non-profit, the Online Trust Alliance, has taken steps to address the problem of cybersecurity in the IoT by releasing an updated IoT Trust Framework. The framework, originally released in 2015, includes 31 principles of trust and privacy that it recommends IoT manufacturers …

Docker has become quite a popular subject lately, with more and more businesses adopting it across industries. So what is Docker, and why is everyone talking about it? To answer that question, we must first go into containers. They are a type of virtualization technology, with their own CPU, memory and resources like a virtual machine. The difference, though, is that containers share the kernel (the brain) of the host operating system and don’t need a guest operating system. Since …

Online Tech’s latest stop during its time in Indiana was the Indy Big Data conference, held on Sept. 1. The aim of the conference was to grow and learn within the big data field and prepare for the exponential amounts of data that are being created with the Internet of Things (IoT). The conference was called “The Tipping Point,” and according to the Big Data website, leaders wanted to focus on “creating a big data culture of success and exploring …

With the era of easily shareable apps and cheap(er) devices in full swing, Shadow IT has emerged as a growing priority to manage for IT organizations. And it’s with good reason—when technology is being used behind your back, it’s tough to know if your business is as secure and compliant as it should be. What can you do to minimize the risk? Here are five ways to manage Shadow IT in your business Stay on top of what’s going on: …

Big data has seen big growth during the past few years. But what is it? Google simply says it’s “extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.” But big data can never be that simple. Rather than just providing information about people’s beliefs through something such as an election vote, big data also gives insight about people’s behaviors—who they are, who they associate with, the things they …

Get started now. Exceptional service awaits.

Live Chat