Tag: cloud security

According to a recent Gartner report, nearly half of large enterprises will deploy hybrid cloud environments by the end of this year. That level of growth is super exciting for the cloud, as more organizations take advantage of a digital-based strategy. However, despite the maturity of the cloud, many CIOs still express concerns. There are two major challenges organizations face in a hybrid cloud environment (or any environment, really.) One is security, which we’ve covered. The other? Compliance. We talked about …

A recent Global CIO survey by Brocade found that 83 percent of CIOs believe procurement of cloud services without IT engagement will increase. This procurement, otherwise known as Shadow IT, continues to grow as organizations reach for a hybrid cloud solution. But even though hybrid cloud has been one cause of Shadow IT (among many), it can also be a solution. If you have Shadow IT within your organization (and most organizations do), then you technically already have a hybrid cloud solution—it’s just …

Virtual private clouds are a hot ticket these days—everyone wants them. We know they aren’t the same as a fully private cloud. But do the differences extend to security, too? Let’s start by reviewing the differences between private and virtual private clouds. If you want your environment completely dedicated to you and to own everything, a private cloud is for you. The equipment will be on a site or data center you own, so you have total control over your infrastructure. …

After the recent eBay data breach in which more than 145 million user records were reportedly compromised by hackers, the internet is once again full of stories about consumers demanding better protection, analysts blaming organizations for not following basic cybersecurity protocol, and tales of hackers that are simply out-sophisticating sophisticated security (eBay used two-factor authentication and encryption, which did protect users’ financial information). There are the standard tips for consumers: change your passwords, don’t use the same password on multiple …

Cyber criminals are being drawn to the healthcare industry like moths to a flame and providers are more vulnerable as the sharing of electronic health records proliferates. To help diminish both those trends, the Institute for Health Technology Transformation (iHT2) recently compiled its “10 Steps to Maintaining Data Privacy in a Changing Mobile World.” With a goal of explaining “how healthcare organizations can best protect themselves from the rapidly growing threat of security breaches and medical identity theft,” the paper …

On May 22nd, industry experts from around the Columbus area will converge to speak at the Data Connectors Columbus Tech Security Conference. This will be held in the Quest Conference Centers in Columbus. The focus of the Data Connectors event circuit is information security. Within these events, topics range from VoIP and LAN security to wireless security and securing USB drives. Below is a sampling from the agenda in Columbus: The Evolution of Endpoint Security: Detecting and Responding to Malware …

This Thursday, April 24th, Online Tech’s Director of Product Management Jason Yaeger will be speaking at the Detroit Data Connectors security conference. The Detroit Data Connectors conference is a one day event focused on various security concerns plaguing businesses around the world. Ranging from email and wireless security to VoIP, USB drive security to LAN security, this conference touches on many hot button IT security topics. Jason’s presentation, running from 4:30-5:15pm will be on the various concerns when working to …

When the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy & Data Security was released earlier this month, it stated that use of cloud services is the second-highest security risk concern for healthcare organizations. Employee negligence was the runaway winner in that category, mentioned by 75 percent of leaders interviewed for the study. Cloud services (41 percent) was bunched in a tight race for second-place with mobile device insecurity (40 percent) and cyber attackers (39 percent). According to the …

Scared of HIPAA? Don’t be. It represents huge opportunities for the IT world. That was the message from April Sage, Director of Healthcare IT for Online Tech, when she joined Karl Palachuk on his ‘Odd Tuesdays‘ podcast yesterday. (Find the replay here.) Palachuk invited Sage to join his bi-weekly show because its primary audience – managed service providers – has been engaged in a debate about whether HIPAA regulations and the HITECH Act make working in the healthcare space “so …

If you’re a member of a healthcare company at HIMSS14 this week, chances are you’re looking for innovations to improve patient outcomes at lower costs. As outlined in a recent press release, Online Tech will exhibit its innovative approach to securing patient data by incorporating encryption at the very core of its cloud and backup infrastructure to protect PHI from the front-end of patient portals all the way to the data-at-rest in offsite disaster recovery environments. This approach means PHI …

Get started now. Exceptional service awaits.

Live Chat