Join us for a free webinar, The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication with Dug Song of Duo Security and Jason Yaeger of Online Tech.
When: June 4 @ 2 P.M. ET
About Online Tech
Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.
Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.
For more information, call (734) 213-2020 or email firstname.lastname@example.org.
- HIPAA breaches high availability SaaS Hosting two-factor authentication managed dedicated servers SaaS pci dss hosting cloud security mobile health IT michigan technology private cloud offsite backup SAS 70 managed server HIPAA violations mHealth Online Tech hipaa cloud hosting mobile security HIPAA compliant data centers IT security michigan data center Software-as-a-Service data security michigan business dedicated servers PCI DSS compliance private cloud hosting managed data center health IT private cloud computing Michigan colocation it disaster recovery disaster recovery dedicated server colocation cloud hosting PCI compliance PCI hosting pci compliant hosting michigan data centers Cloud Computing HIPAA compliance HIPAA compliant hosting HIPAA hosting
Category: Online Tech News
Michigan data center operator Online Tech will be exhibiting a range of secure hosting solutions for mission critical applications, including cloud hosting, colocation, managed servers, compliant hosting and disaster recovery, at the Midwest Technology Leaders 2013 symposium for IT executives … Continue reading
Michigan data center operator Online Tech is exhibiting a range of secure hosting solutions for mission critical applications, including cloud hosting, colocation, managed servers, compliant hosting and disaster recovery, at the Midwest Technology Leaders 2013 symposium for IT executives and … Continue reading
Two weeks from today marks the start of the 9th annual Internet Retailer Conference & Exhibit (IRCE) in Chicago. We’ll be there at booth #108, among the 200 speakers and 9,500 executives related to e-retail. Topics range from creating a … Continue reading
Last week Microsoft had ten different vulnerabilities patched, including another cumulative Internet Explorer update. Two of the patches are considered critical, with the other eight labelled ‘Important’. The patch for Internet Explorer is meant to resolve eleven different vulnerabilities found … Continue reading
Encryption’s the name of the game these days, whether it’s at the software, hardware or storage level. And it’s an industry best practice for organizations that need to meet HIPAA and PCI compliance. We’ve got three webinars lined up for … Continue reading
Upcoming Webinar: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication
Stolen credentials? Hacked social network accounts? Not with two-factor authentication! Learn more about how to protect your company and data with a simple security service. Join Dug Song, CEO of Duo Security and Jason Yaeger, Director of Operations/Risk Management & … Continue reading
Online Tech’s Systems Support Manager, Steve Aiello, will be presenting at Security B-Sides Detroit on securable infrastructures, June 7-8. Security B-Sides is a grassroots, DIY, open security conference bringing together a large number of IT and security professionals found in … Continue reading
The 2013 Midwest Technology Leaders Symposium starts in a week, so if you haven’t gotten yourself registered yet, you still have a little time to get yourself on the list. This symposium is the chance to hear from some of … Continue reading
Join Chris Heuman, Practice Leader for RISC Management and Consulting, and Online Tech for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that … Continue reading