The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

Online Tech recently hosted a webinar on virtual private clouds and how they help your business. Our panelists were Aaron Lake, senior solutions architect, and Kurt Schaldenbrand, product design manager. Together, they have more than 40 years of experience designing and building applications for a variety of platforms and were happy to lend their expertise. Schaldenbrand and Lake gave a comprehensive overview of Online Tech’s virtual private cloud offering and how the easy self-serve options within the client portal, OTPortal, …

Containers and Docker in a nutshell

Posted on September 8, 2016 by

Docker has become quite a popular subject lately, with more and more businesses adopting it across industries. So what is Docker, and why is everyone talking about it? To answer that question, we must first go into containers. They are a type of virtualization technology, with their own CPU, memory and resources like a virtual machine. The difference, though, is that containers share the kernel (the brain) of the host operating system and don’t need a guest operating system. Since …

Indy Big Data conference takeaways

Posted on September 6, 2016 by

Online Tech’s latest stop during its time in Indiana was the Indy Big Data conference, held on Sept. 1. The aim of the conference was to grow and learn within the big data field and prepare for the exponential amounts of data that are being created with the Internet of Things (IoT). The conference was called “The Tipping Point,” and according to the Big Data website, leaders wanted to focus on “creating a big data culture of success and exploring …

Online Tech was onsite at the Data Connectors Indianapolis conference last week, and it was a big success. There were many different speakers at the event, including our own Nick Lumsden, who talked about data security, protecting your assets and tips on garnering buy-in from your executives and boards. In his presentation, Nick discussed the average duration of an attack (243 days) and the average response time from organizations (four or five days for world-class organizations, but typically much longer). …

Virtual private clouds are a hot ticket these days—everyone wants them. We know they aren’t the same as a fully private cloud. But do the differences extend to security, too? Let’s start by reviewing the differences between private and virtual private clouds. If you want your environment completely dedicated to you and to own everything, a private cloud is for you. The equipment will be on a site or data center you own, so you have total control over your infrastructure. …

After Safe Harbor, the international data transfer law used by the U.S. and the European Union, was invalidated in October 2015, the Department of Commerce and the EU Commission worked to draft a new agreement that gave Europeans more rights about their personal information in the U.S. On July 12, the EU-US Privacy Shield law was passed. Why did this agreement come about in the first place? When the EU Court of Justice ruled Safe Harbor invalid, it had two …

There is a fundamental shift happening to IT right now, and it’s changing the way we think about the department: IT as a Service. What is it? It’s an organizational model that corporate and internal IT departments must recognize and adapt to or risk falling behind the curve. But how has this concept revolutionized the industry? Internal IT has changed because its role in business has changed–drastically. Historically, IT has been viewed as a cost center, slow to respond, and …

The European Commission has announced the new EU-US Privacy Shield law, which replaces Safe Harbor effective immediately. The new ruling addresses European concerns about US access to the data of Europeans and gives Europeans more options to file concerns regarding the use of their data. U.S. companies may certify compliance beginning Aug. 1. Tech companies praised the new agreement, saying it restores trust that’s needed after the Edward Snowden leaks of 2013. “Our members are ready to implement the new …

Get started now. Exceptional service awaits.

Live Chat