Tag: disaster recovery

A data loss prevention strategy guide

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more information on IT disaster recovery, download disaster recovery white paper or check out our case studies. In this … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment

7 business drivers for your backup and recovery strategy

In a previous post, I laid out the first three questions your CIO should answer before you start your backup and recovery research. The CIO should provide direction around the value of the data, the Recovery Point Objective (RPO) and … Continue reading

Posted in CEO Voices, Cloud Computing, Disaster Recovery, HIPAA Compliance, PCI Compliance | Tagged , , , | Leave a comment

3 questions your CIO needs to answer to set your offsite backup strategy

There are a number of options for offsite backup, including tape backup shipped offsite, backing up to a simple cloud storage like Amazon, or an enterprise-grade offsite backup and recovery solution. Before any detailed conversation takes place around the technical … Continue reading

Posted in CEO Voices, Cloud Computing, Disaster Recovery | Tagged , , | Leave a comment

Data protection and the cloud

BY YAN NESS Co-CEO, Online Tech In my last blog post I made the case that data is money. So it’s important to have a strategy for data protection just as you would for cash management. It helps to have … Continue reading

Posted in CEO Voices, Cloud Computing, Disaster Recovery | Tagged , , , , | Leave a comment

iHT2 recommendations for HIPAA-compliant cloud business associates

Cyber criminals are being drawn to the healthcare industry like moths to a flame and providers are more vulnerable as the sharing of electronic health records proliferates. To help diminish both those trends, the Institute for Health Technology Transformation (iHT2) … Continue reading

Posted in Cloud Computing, HIPAA Compliance, Information Technology Tips | Tagged , , , , , , , , | Leave a comment

Staying ahead of the enterprise cloud backup and recovery curve

At the end of May, I’m speaking on a panel at IMN’s Data Center East Conference in New York City. The panel is titled “Staying Ahead of the Curve on Services (for data center operators)” and will focus its message … Continue reading

Posted in CEO Voices, Disaster Recovery, Managed Servers, Michigan Colocation | Tagged , , , , , , , , | Leave a comment

Disaster recovery: Steps in a business continuity plan

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more information on IT disaster recovery, download disaster recovery white paper or check out our case studies. BUSINESS CONTINUITY … Continue reading

Posted in Information Technology Tips | Tagged , | Leave a comment

Online Tech Presents with Henry Ford Health System at AFCOM Meeting

On Tuesday, the Michigan chapter of AFCOM held a meeting at Jackson National Life in Lansing, MI. AFCOM is an association working to help advance data center and facilities management professionals around the world. They do this through research, magazines, … Continue reading

Posted in Data Centers, Disaster Recovery, HIPAA Compliance, Online Tech News | Tagged , , , , , , | Leave a comment

CIS Cyber Alert Releases Recommendations to Combat CryptoLocker Malware

Last week I wrote about CryptoLocker in Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker, the well-known malware that is categorized as ‘ransomware’ – it encrypts files on your computer and refuses to decrypt until you pay the malware authors … Continue reading

Posted in Disaster Recovery, Information Technology Tips, Online Tech News | Tagged , , | Leave a comment

Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker

Malware with a business plan – that’s how I’d describe Cryptolocker, the latest encryption-turned-bad software to hit PCs. Categorized as ‘ransomware,’ this type of malware encrypts files on your computer and refuses to decrypt until you pay the malware authors … Continue reading

Posted in Disaster Recovery, Encryption | Tagged , , , , , , , | Leave a comment