As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

How are you fighting Shadow IT?

Posted on November 9, 2016 by

If you’ve found yourself pulling your hair out over Shadow IT, you’re certainly not alone. But there’s no need to stress yourself to death! Here’s why all is not lost if you’re struggling with aligning your IT department with other LOBs: Shadow IT brings to the forefront the very real problem of control vs consumption. If you’re attempting a traditional control-based approach to governing the applications other departments in your business use, take a step back and consider your operation …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

Disaster recovery used to be one of the first items cut from IT budgets, citing time and expense to implement, monitor, manage and maintain something you probably wouldn’t need. But disaster recovery has come a long way, and those reasons are antiquated. However, if you’re looking at cutting IT costs, here are five reasons to keep disaster recovery off the chopping block: It’s a cost-effective option: No more excuses that it’s too expensive and time consuming to have. Thanks to cloud …

How to avoid spear phishing bait

Posted on September 14, 2016 by

In the war against cybercriminals, we’ve learned to block messages from people we don’t know and avoid emails that have an excessive amount of capital letters, exclamation points and bad spelling. We’ve also generally recognized that we sadly haven’t come into a large fortune from a Nigerian prince if we just send him our financial information and a little bit of money. But what if the email is from someone you know, with their email address, a normal-sounding subject line, …

Online Tech was onsite at the Data Connectors Indianapolis conference last week, and it was a big success. There were many different speakers at the event, including our own Nick Lumsden, who talked about data security, protecting your assets and tips on garnering buy-in from your executives and boards. In his presentation, Nick discussed the average duration of an attack (243 days) and the average response time from organizations (four or five days for world-class organizations, but typically much longer). …

With the era of easily shareable apps and cheap(er) devices in full swing, Shadow IT has emerged as a growing priority to manage for IT organizations. And it’s with good reason—when technology is being used behind your back, it’s tough to know if your business is as secure and compliant as it should be. What can you do to minimize the risk? Here are five ways to manage Shadow IT in your business Stay on top of what’s going on: …

What is the future of Big Data?

Posted on August 18, 2016 by

Big data has seen big growth during the past few years. But what is it? Google simply says it’s “extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.” But big data can never be that simple. Rather than just providing information about people’s beliefs through something such as an election vote, big data also gives insight about people’s behaviors—who they are, who they associate with, the things they …

What is shadow IT?

Posted on August 10, 2016 by

Causes of shadow IT Let’s say you’re an employee at a medium size organization, and you’re doing some internet surfing when you come across a new application that allows you to share and store your documents more easily than your current one—and you can connect it to any email account. You’ve been looking for just such a solution! You immediately download it and tell your colleagues about it, and they think it’s the best thing since sliced bread. You start …

Get started now. Exceptional service awaits.

Live Chat