Want to stay informed on all things Online Tech?
Sign up to receive compliant and secure hosting resources now!
- CEO Voices
- Cloud Computing
- Data Centers
- Disaster Recovery
- HIPAA Compliance
- Information Technology Tips
- Managed Servers
- Michigan Colocation
- Michigan Data Center
- Michigan Data Centers
- Mobile Security
- Online Data Storage
- Online Tech News
- PCI Compliance
- SaaS Hosting
- Safe Harbor
- SAS 70/SSAE 16/SOC
Data Encryption Series
About Online Tech
Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.
Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.
For more information, call (734) 213-2020 or email firstname.lastname@example.org.
Tag: data security
Mark Stanislav’s title is “Security Evangelist.” Online Tech has previously provided him a virtual pulpit from which to preach and his barnstorming tour continued last week in Las Vegas, where he spoke at the recently concluded DEF CON 22 Hacker … Continue reading
After the recent rash of high-profile data breaches, the Internet is ripe with tips for handling a breach at your organization. The standard experts’ message: Notify consumers immediately and don’t downplay the impact. The Dallas Morning News has a keen … Continue reading
Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach. AT&T learned that lesson the hard way. From a statement released by the company : “We recently learned that three employees … Continue reading
Patient data collection and analytics are key to success in an accountable care organization environment
There’s a fundamental change underway in the healthcare system, which is shifting away from a traditional fee-for-service model toward a more accountable, patient-centered model of care. Accountable care organizations (ACO) are popping up across the country with what’s being referred … Continue reading
In contrast to the unseasonably cold weather Columbus, Ohio, has experienced of late, this week’s InfoSec Summit kicked off in bright purple ‘Aloha’ style with Jim Manico’s recommendations for improving web application security. Only one other attendee could match his … Continue reading
Those of us working in the security and compliance world are very aware of the data privacy rules and enforcement in different regulated industries: Health and Human Services (HHS) and its Office of Civil Rights (OCR) have broad authority over … Continue reading
The U.S. Department of Homeland Security released a vulnerability note stating Microsoft Internet Explorer “contains a use-after-free vulnerability” that can “allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.” The security flaw was first detected by … Continue reading
Is the FTC coming after your company next? Learn how to avoid it during our next ‘Tuesdays at 2′ webinar series
HIPAA. PCI. SOX. All very familiar, but rather industry-specific, acronyms in the world of regulating data security. A recent court decision confirmed the authority of another powerful player – the FTC – to be the omnibus data security enforcer of … Continue reading
Federal court upholds FTC’s authority to penalize lax cyber security measures protecting personal information and credit card numbers
The Federal Trade Commission has taken new assertive action to protect consumer data privacy interests, this time relating to breaches of payment card information, and other consumer personal information by Wyndham Worldwide, a company which owns and manages hotels. Just … Continue reading
Online Tech was named to CIOReview magazine’s list of the 20 Most Promising Enterprise Security Companies released in its April issue. The magazine reports the purpose of compiling the list is “to help CIOs navigate and find the right enterprise … Continue reading