Search
Support
Login
Contact
Careers
877-740-5028
Solutions
Cloud
Gen3 Cloud
Private Cloud
Public Cloud
Cloud Storage
Data Protection
Disaster Recovery as a Service
Otava DRaaS powered by VMware
Cloud Backup
Otava Cloud Backup for Microsoft 365
Otava Cloud Connect Powered by Veeam
Managed Cloud Backup, powered by Veeam
Self-Managed Cloud Backup, powered by Veeam
Security
Professional Services
Colocation
Operations
Locations
Michigan Data Centers
Indianapolis (IN1)
Las Vegas Hosting (NV1)
Virginia (VA4)
Austin
Sydney (SY4)
Melbourne (ME1)
Manchester (MA3)
Cloud Operations
Compliance
HIPAA Compliance
PCI Compliance
SOC 1 & 2 & 3
ISO 27001 Compliant Hosting
Results
Legendary Stories
Testimonials
Awards
Partner
Partner Programs
Current Partners
Affiliate Partners
About
Why Otava
Our Team
Careers
Blog
Resources
Case studies
White Papers
Videos
References
Press
Events
Close
Information Technology Tips
Simplify Digital Transformation in 2021
Cloud Management and Human Error
Optimizing Workloads for Public and Private Cloud
How to optimize your cloud usage
Tackling the rising costs of cybercrime and data leakage
Twitter Hack a Warning Shot to Business
The Mass Migration of Remote Workers and the Resulting Security Concerns
Otava Backup for Microsoft 365 featured on eChannelNews podcast
Cyber Attacks: Dangerous and Expensive Implications
Java with Otava: CIO Recommendations during COVID-19
Protecting your business from third party breaches
Best practices for the remote worker
Cybersecurity and coronavirus: Cyber threats are on the rise
Business continuity and Coronavirus 2019: Business tips for employee health and safety
PSA: COVID-19 (Coronavirus) Preparedness
Recent news highlights importance of preventing ransomware attacks
Azure Storage Explorer: A friendly way to visualize your stored data in Azure
6 keys to meet GDPR compliance
Transparency: Clearly build trust among your customers
What to do about Bash bug, which could pose bigger threats than Heartbleed
A data loss prevention strategy guide
Potential for undetected breaches is CFOs’ biggest cybersecurity concern
Converge conference in Detroit: InfoSec organizations must learn, modify and adapt like organisms
Converge conference in Detroit: Before finding data breach solution, be sure your business is ready to receive it
Speed of change: Enterprise business technology advancing daily (and faster!)
Cybersecurity tip: Homeland Security says stop using Internet Explorer until bug is fixed
Top 10 tips for securely managing BYOD in the workplace
Senators pushing for data security and breach notification standards
'123456' tops 'password' on list of most common passwords. Funny, now let's stop it.
Check-Box Compliance vs. Compliance as Part of Your Culture
Human error, weak passwords and OS misconfigurations still the most vulnerable targets for hackers
Managing cyber-security threats from inside
Top 5 Vendor Questions When Outsourcing your IT Infrastructure in 2014
Avoiding a High Profile Breach with Preventative IT
The Great Infrastructure as a Service (IaaS) Checklist
Celebrating National Cyber Security Awareness Month (NCSAM)
Quick, Look Over There: DDoS Diversions Result in Millions Stolen from US Banks
Chain of Trust: Importance of Vetting Third-Party Security
Avoiding Business Disruptions Caused by Data Breaches
Tips From an InfoSec Expert: Incident Response
A Quick Tech Tutorial: Two-Factor Authentication
Encryption at the Hardware and Storage Level
April Microsoft Security Updates
DDoS Attacks Continue, and Not Just for Banks
Managed Data Center Operator Expects High Data Demands During March Madness
March Microsoft IT Security Updates
Evernote Adds Two-Factor Authentication
February Microsoft Security Updates
Federal Breaches Highlight Need for Heightened IT Security
Twitter Attacked, 250K Potentially Affected
Ensuring Uptime for Michigan Businesses: How to Configure a High Availability Rack
Stanford Children's Hospital Data Breach
Canada Loan Data Breach Affects 583K
January Microsoft Security Updates
Federal DDoS Attack Warning Issued for Banks
December Microsoft Security Update
Nationwide and Allied Insurance Breach
Adobe Data Breach
November Microsoft Security Update
Michigan Hosting Providers Offer Cost-Effective IT Security for SMBs
Capital One Latest Bank Hit
Michigan Cyber Initiative Reports 'People' As Weakest Link in IT Security
October Microsoft Security Updates
Building Securable Infrastructures
Adobe APT Certificate Attack
Sophos Antivirus Glitch Detected
September Microsoft Security Updates
Social Engineering: Security is a Mindset
The Latest IT Security Stats: Are You At Risk?
Securing Smartphones: Simple Steps to Avoid a Data Breach
University of South Carolina Data Breach
Simple Security Improvements with Your Mobile Device
PCI Compliant Data Center Requirements
Mobile Security: Trying to Keep Up
Review Your Server’s Backup Status with OTPortal®
Use OTPortal® to Monitor your Bandwidth Usage at Online Tech
Review and Request Firewall Rule Changes with OTPortal®, Our Client Portal
How to Migrate a MySQL Database Using mysqldump
Protecting your Personal Data Integrity with Drive Encryption and Password Vault
Chronicles of a Techie: Firewall Documentation
How to Extend a T1 from an ADC Telecommunications Panel
The Importance of Overlapping Security Systems: Minimize the Risk of Intrusion and Theft of Your Resources
Why it is Important to Create a SPF (Sender Policy Framework) Record
Operating System Security Essentials
Free To Do List Application - Remember the Milk
How Secure Are My Servers?
Great Online Project-Management Tool for Small or Large Teams
Server Refused Connection Fix
Use Two Computers Using A Single Keyboard and Mouse with Input Director
How To Securing Your Website from Unwanted Access with Apache or IIS
How to Filter Spam, Phishing Emails, and Viruses Correctly without Blocking Legitimate Mail