Tag: encryption

A security researcher named Mathy Vanhoef of KU Leuven in Belgium has disclosed a vulnerability in the current WPA2 network. All routers that use a WPA2 (which is almost every single WiFi enabled device today) is vulnerable to a Key Reinstallation Attack (KRACK). Information that was once assumed to be safely encrypted, such as messages, passwords, photos, or credit card numbers, can now be read, and in some cases, manipulated. The problem is unfortunately not with a specific product, but rather …

One of the biggest concerns around hybrid cloud for organizations is data security. According to Gartner, 38 percent of companies who don’t plan to use public cloud cited security and privacy as the main reasons. It’s very logical (and necessary) to ask how the cloud will protect your most valuable asset – your data. What are the biggest security challenges in hybrid cloud adoption? According to experts, the biggest security concerns in a hybrid environment are compliance, lack of encryption, poor …

Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would discover more than 100 variants before year’s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, …

We’ve already talked about the need to invest in an IT security budget as a best practice for business. Whether that’s an alarm for the door, a safe to guard money, or a firewall behind its network systems, security helps people and organizations sleep better at night. But even with a lock on the door, burglars can still find a way to get in. The same goes for the security of your data. We’ve all heard of the data breaches of Target, …

Encryption has been widely talked about as one of the best tools to protect you against potential attacks on your data. For many companies processing credit card payments, encrypting data is required for compliance with standards such as PCI DSS and individual state laws. But if you’re in the healthcare industry, it’s even more important because it’s not required for hipaa compliance. What is encryption? It takes your data and codes it using a series of mathematical formulas to render …

As we all take a step back to reminisce about the past year and drop the ball on a new one, those of us at Online Tech have plenty of achievements to celebrate. We’ve called this, our 20th year of existence, “the most ambitious and successful 12 months” in the company history in a recent press release. That’s notable, considering our 20th anniversary story about how we’ve evolved from being Michigan’s first ISP in 1994 to a leader in secure …

Data is growing exponentially. Not just in size, but also in importance to organizations. So how do you protect that data while simultaneously assuring it can be quickly recovered in case of an emergency? A recent Online Tech “Tuesdays at 2” webinar discussed how organizations can turn offsite backup into a recovery option. In “Transforming Your Offsite Backup into a Real Recovery Option,” guest host Steven Aiello led an in-depth dive into what he calls the “data protection spectrum” and …

Are you wondering what all the HIPAA fuss is about? Here are a few basics go get you started, along with some reference to in-depth videos along the way. What is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996 that specifies laws for the protection and use of Personal (or Protected) Health Information (PHI) which is essentially your medical record. HIPAA was intended to ease the sharing of Personal Health Information (PHI) between entities that have …

The development of a widely-used encryption tool appears to have come to an end. The TrueCrypt page at SourceForge is telling visitors that the open source encryption software “is not secure as it may contain unfixed security issues.” It informs users to not use their software because development ended this month after Microsoft terminated support of Windows XP. It also provides steps to migrate from TrueCrypt to Microsoft’s BitLocker. Early concern that the message was a hoax or hostile takeover …

At the end of May, I’m speaking on a panel at IMN’s Data Center East Conference in New York City. The panel is titled “Staying Ahead of the Curve on Services (for data center operators)” and will focus its message on market demand for managed services that deliver high value for colocation and cloud computing users. I define high value as an essential service that a service provider can deliver at a lower cost and with higher quality than their …

Get started now. Exceptional service awaits.

Live Chat