Information Technology Tips

Closing the Cloud Skills Gap at your Organization

Cloud Security Governance

Simplify Digital Transformation in 2021

Cloud Management and Human Error

Optimizing Workloads for Public and Private Cloud

How to optimize your cloud usage

Tackling the rising costs of cybercrime and data leakage

Twitter Hack a Warning Shot to Business

The Mass Migration of Remote Workers and the Resulting Security Concerns

Otava Backup for Microsoft 365 featured on eChannelNews podcast

Cyber Attacks: Dangerous and Expensive Implications

Java with Otava: CIO Recommendations during COVID-19

Protecting your business from third party breaches

Best practices for the remote worker

Cybersecurity and coronavirus: Cyber threats are on the rise

Business continuity and Coronavirus 2019: Business tips for employee health and safety

PSA: COVID-19 (Coronavirus) Preparedness

Recent news highlights importance of preventing ransomware attacks

Azure Storage Explorer: A friendly way to visualize your stored data in Azure

6 keys to meet GDPR compliance

Transparency: Clearly build trust among your customers

What to do about Bash bug, which could pose bigger threats than Heartbleed

A data loss prevention strategy guide

Potential for undetected breaches is CFOs’ biggest cybersecurity concern

Converge conference in Detroit: InfoSec organizations must learn, modify and adapt like organisms

Converge conference in Detroit: Before finding data breach solution, be sure your business is ready to receive it

Speed of change: Enterprise business technology advancing daily (and faster!)

Cybersecurity tip: Homeland Security says stop using Internet Explorer until bug is fixed

Top 10 tips for securely managing BYOD in the workplace

Senators pushing for data security and breach notification standards

'123456' tops 'password' on list of most common passwords. Funny, now let's stop it.

Check-Box Compliance vs. Compliance as Part of Your Culture

Human error, weak passwords and OS misconfigurations still the most vulnerable targets for hackers

Managing cyber-security threats from inside

Top 5 Vendor Questions When Outsourcing your IT Infrastructure in 2014

Avoiding a High Profile Breach with Preventative IT

The Great Infrastructure as a Service (IaaS) Checklist

Celebrating National Cyber Security Awareness Month (NCSAM)

Quick, Look Over There: DDoS Diversions Result in Millions Stolen from US Banks

Chain of Trust: Importance of Vetting Third-Party Security

Avoiding Business Disruptions Caused by Data Breaches

Tips From an InfoSec Expert: Incident Response

A Quick Tech Tutorial: Two-Factor Authentication

Encryption at the Hardware and Storage Level

April Microsoft Security Updates

DDoS Attacks Continue, and Not Just for Banks

Managed Data Center Operator Expects High Data Demands During March Madness

March Microsoft IT Security Updates

Evernote Adds Two-Factor Authentication

February Microsoft Security Updates

Federal Breaches Highlight Need for Heightened IT Security

Twitter Attacked, 250K Potentially Affected

Ensuring Uptime for Michigan Businesses: How to Configure a High Availability Rack

Stanford Children's Hospital Data Breach

Canada Loan Data Breach Affects 583K

January Microsoft Security Updates

Federal DDoS Attack Warning Issued for Banks

December Microsoft Security Update

Nationwide and Allied Insurance Breach

Adobe Data Breach

November Microsoft Security Update

Michigan Hosting Providers Offer Cost-Effective IT Security for SMBs

Capital One Latest Bank Hit

Michigan Cyber Initiative Reports 'People' As Weakest Link in IT Security

October Microsoft Security Updates

Building Securable Infrastructures

Adobe APT Certificate Attack

Sophos Antivirus Glitch Detected

September Microsoft Security Updates

Social Engineering: Security is a Mindset

The Latest IT Security Stats: Are You At Risk?

Securing Smartphones: Simple Steps to Avoid a Data Breach

University of South Carolina Data Breach

Simple Security Improvements with Your Mobile Device

PCI Compliant Data Center Requirements

Mobile Security: Trying to Keep Up

Review Your Server’s Backup Status with OTPortal®

Use OTPortal® to Monitor your Bandwidth Usage at Online Tech

Review and Request Firewall Rule Changes with OTPortal®, Our Client Portal

How to Migrate a MySQL Database Using mysqldump

Protecting your Personal Data Integrity with Drive Encryption and Password Vault

Chronicles of a Techie: Firewall Documentation

How to Extend a T1 from an ADC Telecommunications Panel

The Importance of Overlapping Security Systems: Minimize the Risk of Intrusion and Theft of Your Resources

Why it is Important to Create a SPF (Sender Policy Framework) Record

Operating System Security Essentials

Free To Do List Application - Remember the Milk

How Secure Are My Servers?

Great Online Project-Management Tool for Small or Large Teams

Server Refused Connection Fix

Use Two Computers Using A Single Keyboard and Mouse with Input Director

How To Securing Your Website from Unwanted Access with Apache or IIS

How to Filter Spam, Phishing Emails, and Viruses Correctly without Blocking Legitimate Mail