Want to stay informed on all things Online Tech?
Sign up to receive compliant and secure hosting resources now!
- CEO Voices
- Cloud Computing
- Data Centers
- Disaster Recovery
- HIPAA Compliance
- Information Technology Tips
- Managed Servers
- Michigan Colocation
- Michigan Data Center
- Michigan Data Centers
- Mobile Security
- Online Data Storage
- Online Tech News
- PCI Compliance
- SaaS Hosting
- Safe Harbor
- SAS 70/SSAE 16/SOC
Data Encryption Series
About Online Tech
Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.
Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.
For more information, call (734) 213-2020 or email email@example.com.
Tag: data security
With 2013 wrapping up and 2014 close on the horizon, many organizations are reviewing their IT infrastructure needs. For some, it’s an active, ongoing conversation; others wish they could sweep that discussion under the desk for another year. Regardless of … Continue reading
Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Actually – data is … Continue reading
Online Tech is exhibiting secure and compliant hosting solutions at Detroit SecureWorld 2013, held yesterday and today. Online Tech’s Senior Product Architect Steve Aiello spoke on a panel about network security: Network Security Industry Panel Discussion Panelists: Steven Aiello, Shane Harsch, Paul Giorgi, Don Gray, … Continue reading
According to the 2013 Cost of a Cybercrime Study conducted by the Ponemon Institute and Hewlett-Packard, the cost of cybercrime has increased 78 percent since the first study was conducted four years ago. The cost to enterprises to pay to … Continue reading
Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining how encryption fits into the three premises of security. Encryption plays into the three premises of security: Confidentiality – keeping data private Integrity … Continue reading
In just one short week, Secureworld is holding their annual Detroit conference. The Detroit Secureworld Expo 2013 is going to be a two day event, featuring some really important and knowledgeable people in the IT security field. Here’s just a … Continue reading
Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data. Encryption involves a series of different mathematical formulas that are … Continue reading
Defense in depth – what does it mean? NSA.gov, the U.S. National Security Agency, refers to the term as a “practical strategy for achieving Information Assurance in today’s highly networked environments,” citing Information Assurance to include the protection of information … Continue reading
The most recent hack on at least three major banks involved “low-powered” DDoS attacks targeting wire payment switch systems. A wire payment switch system manages and executes wire transfers at banks. While the story is still developing on how exactly … Continue reading
The following is a guest blog from Ann Arbor-based Duo Security‘s Security Evangelist, Mark Stanislav: A recent article from Forbes titled, “Is Your Investment In Security Really Worth It?”, called into question whether or not the money spent for information security … Continue reading