Category: Information Technology Tips

A data loss prevention strategy guide

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more information on IT disaster recovery, download disaster recovery white paper or check out our case studies. In this … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment

Keeping cybercrime secrets despite increasing data breach reports

We attempt to stay on top of cyber security and data breach topics here on the Online Tech blog, providing some industry perspective to news of large data breaches like those at Community Health Systems, P.F. Changs, eBay, Target and … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, PCI Compliance | Tagged , , , , | Leave a comment

U.S. internet connection speed lacking overall, Michigan among top 10 fastest states

How fast is your internet connection? Chances are, if you’re in the United States, it could be faster. In Akamai Technologies’ recently released State of the Internet Report, the U.S. isn’t among the top 10 of countries or regions in … Continue reading

Posted in Cloud Computing, Information Technology Tips | Leave a comment

Russian hackers steal more than 1 billion passwords in record-breaking data breach

Hold Security, a firm credited with uncovering significant data breaches – such as the one at Adobe Systems in October 2013 – has uncovered a record-breaking hack of 1.2 billion username and passwords from multiple websites. From the Hold Security … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, PCI Compliance | Tagged , , , , | Leave a comment

Data breach reporting: A job killer or business saver?

There’s quite a brouhaha bubbling up Down Under. It all stems from a Sydney Morning Herald opinion piece written by the CEO of the Association of Data Driven Marketing and Advertising opposing the mandatory data breach reporting law introduced to … Continue reading

Posted in HIPAA Compliance, Information Technology Tips, PCI Compliance | Tagged | Leave a comment

The next big retail fraud? Jimmy John’s investigating possible data breach

Unauthorized activity on credit cards recently used at Jimmy John’s locations has led the sandwich chain to work with authorities on an investigation of a potential data breach. KrebsOnSecurity.com first reported on the issue Thursday, stating the chain “did not … Continue reading

Posted in Information Technology Tips, PCI Compliance | Tagged , | Leave a comment

Potential for undetected breaches is CFOs’ biggest cybersecurity concern

Ever wonder what your company’s CFO is most worried about when it comes to cybersecurity? We may have your answer. Dig deep down through Grant Thornton LLP’s bi-annual survey of CFOs and other senior financial executives for a pretty good … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment

Converge conference in Detroit: Before finding data breach solution, be sure your business is ready to receive it

More from the Converge information security conference in Detroit, this time recapping Enterprise Security Back to Basics presented by Joel Cardella, the director of information security, IT security, governance, risk and compliance at Holcim US. (Also see a recap of … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment

Want a good job? Study computer or information science

Momma, don’t let your babies grow up to be cowboys. Don’t let ‘em pick guitars and drive them old trucks. Make ‘em be software engineers and network systems analysts and such. With apologies to Waylon Jennings, it’s true that a … Continue reading

Posted in Information Technology Tips, Online Tech News | Tagged | Leave a comment

Converge conference in Detroit: InfoSec organizations must learn, modify and adapt like organisms

Today is Day 2 of the Converge information security conference at Detroit’s Cobo Center, and it promises to be full of significant insights into IT security within organizations. Here’s a recap of one of Thursday’s sessions, The Challenge of Natural … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment