Join us for a free webinar, The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication with Dug Song of Duo Security and Jason Yaeger of Online Tech.
When: June 4 @ 2 P.M. ET
About Online Tech
Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.
Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.
For more information, call (734) 213-2020 or email email@example.com.
- high availability HIPAA breaches managed dedicated servers SaaS Hosting two-factor authentication SaaS pci dss hosting michigan technology mobile health IT cloud security private cloud offsite backup mHealth SAS 70 managed server Online Tech HIPAA violations hipaa cloud hosting mobile security HIPAA compliant data centers IT security michigan data center Software-as-a-Service michigan business data security PCI DSS compliance dedicated servers private cloud hosting managed data center private cloud computing health IT Michigan colocation it disaster recovery disaster recovery dedicated server colocation cloud hosting PCI compliance PCI hosting pci compliant hosting michigan data centers Cloud Computing HIPAA compliance HIPAA compliant hosting HIPAA hosting
Tag: PCI DSS compliance
Upcoming Webinar: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication
Stolen credentials? Hacked social network accounts? Not with two-factor authentication! Learn more about how to protect your company and data with a simple security service. Join Dug Song, CEO of Duo Security and Jason Yaeger, Director of Operations/Risk Management & … Continue reading
“Welcome to the Wild, Wild West of security.” That’s how guest host Adam Goslin opened the latest in Online Tech’s “Tuesday at 2” webinar series, PCI DSS Guidance for Mobile Security. The COO of High Bit Security lent his expertise … Continue reading
Online Tech is exhibiting PCI hosting solutions at the 2013 ETA (Electronic Transactions Association) Annual Meeting & Expo at booth #1237. The conference will be held in New Orleans from April 30-May 2 at the New Orleans Convention Center. Government … Continue reading
If you’re a merchant, electronic transaction processes are both extremely important, and incredibly difficult to set up and maintain. If at any time a company stores, processes, or transmits credit card data, they must provide a PCI compliant environment for … Continue reading
In February, the supermarket chain Bashas’ Family of Stores found unique malware on their network that allowed attackers access to cardholder data across their 130 locations. Interestingly, Bashas’ is attesting that they were, in fact, compliant at the time of … Continue reading
On February 26th, Adam Goslin, COO of High Bit Security, joined us for the webinar Updates to PCI-DSS Compliance for E-Commerce and Cloud Computing Security. In the hour-long discussion Adam really dug into the specifics of the supplements that came … Continue reading
Access is a huge security concern for every company, no matter the industry. Thus, having an extra layer of technical security in place that employees must go through in order to access a company’s network can help reduce the risk … Continue reading
We spend a lot of time talking about PCI compliance here on the blog. And we have lots to say- there are so many little facets on the way to compliance that the conversations fall all over each other to … Continue reading
Last month the Payment Card Industry Security Standards Council (PCI SSC) released their Information Supplement: PCI DSS E-Commerce Guidelines. These guidelines were focused on e-commerce merchants, and how to keep compliant whether outsourcing payment processing, keeping it in-house, or creating … Continue reading
The PCI DSS (Payment Card Industry Data Security Standards) require the use of certain technical security services. Below is a matrix of the requirements paired with actual PCI compliant services that fulfill them. Click on each PCI compliant service to … Continue reading