Tag: information security

We’re very excited to announce that each of our five data centers as well as our headquarters are officially certified as ISO 27001 compliant! We received the good news from our auditors this month. The entire process took about four months–much faster than we or our auditors expected. What is ISO 27001 What’s so special about this? What is ISO 27001, anyway? Well, ISO 27001 is one in a set of standards that specifically outlines the requirements for establishing, implementing, maintaining …

‘Tis the season for holiday parties! While we know your schedule is probably very busy between the end of quarter push and the family just about to show up on your doorstep, we think you should make room for a little bit of infosec fun. This Thursday from 6 to 9pm, The Central Indiana ISSA will be putting on their annual holiday party. The event will be at the Tow Yard Brewery in Indianapolis, and promises to be a great …

More from the Converge information security conference in Detroit, this time recapping Enterprise Security Back to Basics presented by Joel Cardella, the director of information security, IT security, governance, risk and compliance at Holcim US. (Also see a recap of Thursday’s The Challenge of Natural Security Systems.) Why this back to basics talk? Cardella feels we’re being beguiled by all these large breaches that push people to a solution they aren’t yet ready to receive. He holds that the importance …

Today is Day 2 of the Converge information security conference at Detroit’s Cobo Center, and it promises to be full of significant insights into IT security within organizations. Here’s a recap of one of Thursday’s sessions, The Challenge of Natural Security Systems, presented by Rockie Brockaway, the security practice director at Black Box: Brockaway started with a really important point: Information security is currently viewed as a tactical response within companies, when it should be treated as a function of …

On May 22nd, industry experts from around the Columbus area will converge to speak at the Data Connectors Columbus Tech Security Conference. This will be held in the Quest Conference Centers in Columbus. The focus of the Data Connectors event circuit is information security. Within these events, topics range from VoIP and LAN security to wireless security and securing USB drives. Below is a sampling from the agenda in Columbus: The Evolution of Endpoint Security: Detecting and Responding to Malware …

Next Wednesday, Online Tech heads to Detroit, Michigan to join the region’s Fortune 1000 CIOs while exhibiting secure hosting solutions, including the encrypted cloud, at Evanta’s 11th Annual Detroit Executive Summit at the Sheraton Detroit Novi Hotel. The summit is hosted by the Technology and Business Innovation Forum (TBIF) of the Stephen M. Ross School of Business at the University of Michigan, as well as Detroit’s Society for Information Management (SIM). Built “by CIOs, for CIOs,” the event features a number of sessions and keynotes on …

According to the 2013 Bit9 Server Security Survey Report, 55 percent of IT and security professionals’ top server security concerns include targeted attacks and data breaches on their servers. Another 26 percent report they have been hit by advanced malware, up from 2011 when only 17 percent reported the same. When it comes to which kind of servers pose the highest risk, 52 percent said web servers, with file servers and email servers trailing behind at 12 and 11 percent, …

Malware with a business plan – that’s how I’d describe Cryptolocker, the latest encryption-turned-bad software to hit PCs. Categorized as ‘ransomware,’ this type of malware encrypts files on your computer and refuses to decrypt until you pay the malware authors a fee. What’s worse is the threat of permanent deletion if you don’t pay – the malware displays a countdown timer that shows you how long you have to pay up until your files are gone forever, as ThreatTrackSecurity.com reports. …

The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords. While merely speculative during early investigations, it has been recently verified that the source …

Cloud-based security revenue is forecasted to reach $9.2 billion by 2017, at a CAGR (compound annual growth rate) of 10.8 percent. In addition, the managed security market is projected to grow 45 percent. According to FierceTelecom.com, the significant growth can be attributed to: Increase in the complexity and volume of threats BYOD (Bring Your Own Device) and distributed workforce (more remote) Security product sprawl This study complements another focused on the rise in distributed denial of service (DDOS) attacks that …

Get started now. Exceptional service awaits.

Live Chat