Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

Online Tech recently hosted a webinar on virtual private clouds and how they help your business. Our panelists were Aaron Lake, senior solutions architect, and Kurt Schaldenbrand, product design manager. Together, they have more than 40 years of experience designing and building applications for a variety of platforms and were happy to lend their expertise. Schaldenbrand and Lake gave a comprehensive overview of Online Tech’s virtual private cloud offering and how the easy self-serve options within the client portal, OTPortal, …

As we get more devices and connect them to the cloud, it’s only natural that the rise of user-centric computing should follow. What is that, and what effect does it have on the IT industry? Let’s start with defining user-centric computing. According to OneStopClick, “A user-centric computing system is a ubiquitous system consisting of information and devices that users can access anytime and anywhere.” Wikipedia says, “The chief difference from other product design philosophies is that user-centered design tries to optimize the …

The growing number of devices connected to the Internet of Things or IoT, provides an endless number of possibilities for our world. But as more and more devices come out, it’s impossible to ignore the security of them. One non-profit, the Online Trust Alliance, has taken steps to address the problem of cybersecurity in the IoT by releasing an updated IoT Trust Framework. The framework, originally released in 2015, includes 31 principles of trust and privacy that it recommends IoT manufacturers …

Disaster recovery used to be one of the first items cut from IT budgets, citing time and expense to implement, monitor, manage and maintain something you probably wouldn’t need. But disaster recovery has come a long way, and those reasons are antiquated. However, if you’re looking at cutting IT costs, here are five reasons to keep disaster recovery off the chopping block: It’s a cost-effective option: No more excuses that it’s too expensive and time consuming to have. Thanks to cloud …

How to avoid spear phishing bait

Posted on September 14, 2016 by

In the war against cybercriminals, we’ve learned to block messages from people we don’t know and avoid emails that have an excessive amount of capital letters, exclamation points and bad spelling. We’ve also generally recognized that we sadly haven’t come into a large fortune from a Nigerian prince if we just send him our financial information and a little bit of money. But what if the email is from someone you know, with their email address, a normal-sounding subject line, …

Docker has become quite a popular subject lately, with more and more businesses adopting it across industries. So what is Docker, and why is everyone talking about it? To answer that question, we must first go into containers. They are a type of virtualization technology, with their own CPU, memory and resources like a virtual machine. The difference, though, is that containers share the kernel (the brain) of the host operating system and don’t need a guest operating system. Since …

Online Tech’s latest stop during its time in Indiana was the Indy Big Data conference, held on Sept. 1. The aim of the conference was to grow and learn within the big data field and prepare for the exponential amounts of data that are being created with the Internet of Things (IoT). The conference was called “The Tipping Point,” and according to the Big Data website, leaders wanted to focus on “creating a big data culture of success and exploring …

Online Tech was onsite at the Data Connectors Indianapolis conference last week, and it was a big success. There were many different speakers at the event, including our own Nick Lumsden, who talked about data security, protecting your assets and tips on garnering buy-in from your executives and boards. In his presentation, Nick discussed the average duration of an attack (243 days) and the average response time from organizations (four or five days for world-class organizations, but typically much longer). …

Virtual private clouds are a hot ticket these days—everyone wants them. We know they aren’t the same as a fully private cloud. But do the differences extend to security, too? Let’s start by reviewing the differences between private and virtual private clouds. If you want your environment completely dedicated to you and to own everything, a private cloud is for you. The equipment will be on a site or data center you own, so you have total control over your infrastructure. …

Get started now. Exceptional service awaits.

Live Chat