Disaster Recovery as a Service
Otava Cloud Backup for Microsoft 365
Otava Cloud Connect Powered by Veeam
Managed Cloud Backup, powered by Veeam
Self-Managed Cloud Backup, powered by Veeam
Michigan Data Centers
Las Vegas Hosting (NV1)
SOC 1 & 2 & 3
ISO 27001 Compliant Hosting
Managed cloud backup vs self-managed cloud backup
Recap: Ransomware preparedness with Otava, Veeam and MSPs
Ransomware attacks up in 2020: How to protect yourself
What is Zero Trust Security?
How to Respond to the Not-So-New Iranian Cybersecurity Threat
3 IT New Year's resolutions to keep in 2020
Disaster Recovery lessons we all can learn
NCSAM: Do you Own IT? Secure IT? Protect IT?
Four Security Considerations for your Hybrid Cloud
Famous Hacks and the Gaffes that Caused Them
What is Public Cloud Vendor Lock-in?
Demystifying Cloud Governance, Risk and Compliance
Compliance and Security Make Beautiful Bedfellows
Achieving compliance in a hybrid cloud
Achieving security in the cloud
3 Key benefits of hybrid cloud
Is hybrid cloud right for your business?
3 ways to optimize your hybrid cloud costs
Online Tech World Tour: Virginia--it's for lovers, and data centers
Online Tech World Tour: Viva Las Vegas!
Online Tech World Tour: Cheerio from Manchester!
Online Tech World Tour: Hello from Melbourne!
Online Tech World Tour: G'Day from Sydney!
Online Tech world tour: Hello from Indianapolis!
Online Tech World Tour: Greetings from Michigan!
Join Online Tech at ITEXPO
How to Protect Yourself on Data Privacy Day
Online Tech to present at IT Nation Evolve
3 Security Resolutions to Keep in 2019
Online Tech Acquires Neverfail's Cloud Business
How to Stay Safe When Shopping Online
Addressing Security Vulnerabilities in IoT Devices
Lessons Learned from the Facebook Data Breach
Visit Online Tech at the Indianapolis IT Symposium!
Azure outage affects South Central US data center
What is ISO 27001 compliance?
3 ways to prevent insider security threats
2019 cloud computing trends to look out for
Spectre and Meltdown updates
Visit Online Tech at the Indianapolis VMUG conference July 10!
Online Tech certified as ISO 27001 compliant
Machine learning + Azure: What's new?
Are you ready for GDPR?
What is edge computing?
How do the Amazon S3 bucket mistakes affect me?
Ransomware predictions for 2018
The dangers of using SMS text for two-factor authentication
Adding voice passwords to protect your accounts
What is the new WIFI vulnerability, and how do I fix it?
Understanding and stopping cloud sprawl
How to protect yourself after the Equifax data breach
What is business intelligence?
Machine learning FAQ
Azure containers and container instances
SSAE 18 vs SSAE 16: Key differences in the new SOC 1 standard
Online Tech talks hybrid cloud with Ann Arbor's WLBY radio
3 ways to control costs in Microsoft Azure
Manage cloud costs with SprawlGuard™
Cloud is sprawling unchecked, but here’s how you seize control
How containers and hybrid cloud work together
Online Tech a sponsor of 2017 inX3 conference
Ransomware attacks 74 countries, UK hospitals down
How to control Shadow IT in a hybrid cloud
Congratulations to MOBI Wireless for winning Mira's Tech Company of the Year!
Four cloud computing terms you need to know
How do the new Internet privacy rules affect you?
Mobile-based platforms in healthcare IT
The 6 best ransomware resources on the web
How to prevent data jacking
Lessons learned from AWS S3 outage: Seize control of your IT
How does Ransomware as a Service work?
The importance of infrastructure to Big Data analytics
Cybersecurity and the Internet of Things
Seven best practices for securing yourself against ransomware in 2017
The rise of X as a Service (XaaS)
What is malvertising?
Ransomware and healthcare: What you need to know
Online Tech joins Privacy Shield: What does that mean?
Congratulations to Detroit Crain’s Top 50 Names to Know in IT
How to protect your data: Four simple steps
How are you fighting Shadow IT?
Control vs consumption based IT operational models
White House partners with Facebook, others, to encourage two-factor authentication
CIOs, beware: Rogue IT still lurks in the shadows
What caused the internet to break on Friday, Oct. 21, 2016?
Online Tech hosts webinar on virtual private clouds
Four reasons to keep disaster recovery in your IT security budget
How to avoid spear phishing bait
Containers and Docker in a nutshell
Indy Big Data conference takeaways
Online Tech at Data Connectors Indianapolis
Top 5 ways your business can manage Shadow IT
What is the future of Big Data?
What's ahead for the Internet of Things (IoT)?
How is IT as a Service (ITaaS) changing businesses?
Will DR funding survive the next economic downturn?
European Commission approves EU-US Privacy Shield
Online Tech discusses Shadow IT, cybersecurity at Grosse Pointe Yacht Club
What to look for in an offsite backup provider
Online Tech CEO to speak at data center conference
Yan Ness offers insights at IMN conference in Washington, D.C.
Platform as a Service (PaaS) FAQ
Top 5 criteria to consider in a data protection provider
Why Disaster Recovery as a Service (DRaaS) finally makes DR simple and affordable
Data is money
Lessons learned from bringing a new UPS online
Selling IT disaster recovery to your board of directors
Taking disaster recovery from complex to simple
What happens during a data center outage?
Flash, SAS or SATA storage?
Encryption is the key to the data kingdom
What is object storage?
Data virtualization: Opportunity or threat to IT?
Why Indianapolis, Indiana is a great location for data hosting
Top 5 evaluation criteria for data center selection
Investing in security: What's good for the business is good for the brand
EU announces Safe Harbor replacement coming soon
How to protect yourself against social engineering
Four reasons why if you’re in healthcare, you need encryption, even if it's not required
What role does disaster recovery play in your business continuity strategy?
What’s the value in continually investing in an IT security budget?
Michigan Data Center Tax Reform Signed into Law
Critical reasons to value your data
Get your IT security budget approved
Safeguarding Patient Data in EHRs
One key difference between cloud providers
There’s a New Compliance Cop in Town: The FTC
Defining Our Company Purpose
Online Tech Featured on IT in the D Podcast
Why Two Heads are Better than One
How to Avoid "Stranded Backup" and Get Data Back to Production
Why IP addresses are no longer free
Who's to blame in a data breach?
Meet Cloud Security Experts in Indianapolis
Get Trade Secrets of Cloud Security from World-Class Experts
Why We Built a High-Speed Encrypted Cloud
Cloud Security: Get Peace of Mind
Delivering the Ultimate Client Experience
Maintaining privacy in the cloud: culture's keeper?
Looking back: Online Tech celebrating a ‘transformational’ 2014
The Need For Disaster Recovery: Lance Thompson Talks DR
Metro Detroit Business Continuity & Disaster recovery Workshop
Why It's Important To Choose Your Backup Window
Football fever comes to Online Tech; Indianapolis data center hosting special playoff tailgate event
Getting to know our Indianapolis staff: Data Center Administrator Travis Arbogast
Start Your Business Continuity Plan With A Business Impact Analysis
New Year, New Outlook: Indianapolis Business Continuity and Disaster Recovery Workshop
Online Tech Hosts Central Indiana ISSA at Indianapolis Data Center
‘Loaded up’ Indianapolis cloud can eliminate capital outlay, extend IT team expertise and help meet compliance demands
Tales from the disaster recovery trenches result in solid business continuity advice
Online Tech guests witness 'Defense in Depth' at Joe Louis Arena
Considerations Before Initially Moving Data Offsite
Backup is the 'sweet spot' on the data protection spectrum
Mitigating the management expense of offsite backup
Indianapolis cloud brings compliance and flash-y performance
Miss our Metro Detroit Data Center open house celebration? Here's a recap
Central Indiana ISSA Holiday Party
Offsite backup and recovery questions to ask your business
Be our guest at the Metro Detroit data center grand opening today!
Coming to our Metro Detroit Data Center open house? Bring a dog bowl. (Explanation below)
Disaster recovery expert to guest host Online Tech 'Tuesdays at 2' webinar
Please consider joining Online Tech in supporting Feeding America this holiday season
Michigan Council of Women in Technology Event
Giving unlikely thanks? How about your auditor?
20th anniversary: Thoughts from Online Tech co-founder Gary Baker on the company's evolution
Collaboration At The 12th Annual Detroit CIO Executive Summit
Where Offsite Backup and Recovery Fits in the Data Protection Spectrum
Offsite Backup, Onsite Backup, or Both?
Major retail data breaches continue; do consumers care?
Infographic: HIPAA and Meaningful Use
Open house on Dec. 2: Check out Metro Detroit's newest data center
Recap: Online Tech celebrates opening of new Indianapolis data center
Join Online Tech at cloud-focused TechEx in Detroit on Wednesday
Offsite backup and recovery: Understanding the hidden costs
We spent HOW much time to restore that backup file? Significantly less with file-level restoration
TechPoint is driving Indiana’s technology growth
Online Tech part of webinar presentation of 5 tools to protect patient data
Backing up sensitive data for recovery? Meet Mr. FIPS
7 questions to keep your offsite backup and recovery out of the outhouse
5 tools to protect patient data
Client profile: Baseline Data Services serious about disaster recovery
Bringing secure, compliant hosting to Indianapolis
Online Tech's April Sage, attorney Tatiana Melnik presenting on challenges and opportunities of cloud computing at AHIMA conference
Visit the grand opening of our Indianapolis data center on Oct. 23
Michigan HIMSS 2014 Fall Conference
7 business drivers for your backup and recovery strategy
Keeping cybercrime secrets despite increasing data breach reports
3 questions your CIO needs to answer to set your offsite backup strategy
Largest HIPAA breach ever: Hackers steal data on 4.5 million Community Health Systems patients
U.S. internet connection speed lacking overall, Michigan among top 10 fastest states
Improving security on the 'Internet of Things'
Russian hackers steal more than 1 billion passwords in record-breaking data breach
Data breach reporting: A job killer or business saver?
The next big retail fraud? Jimmy John’s investigating possible data breach
Want a good job? Study computer or information science
Online Tech opens its doors to fast-growing tech hub of Metro Detroit
Americans agree government must do more to protect data, but can the government act?
Don’t Strand your Data (Stranded Backups)
IT-as-a-Service: Need for speed and drive to align is changing operating model
Experts: Be fast and forthcoming with details of a data breach
Data protection and the cloud
Friend or foe? Cybersecurity risks for shared data and a few precautions
Shift in ownership of IT dollars: Competition makes everyone better
Smitten with the mitten: Online Tech honored for improving economy in state of Michigan
Another U.S. retailer discovers the real cost of card holder data theft: customer loyalty
Data is money: Just as money belongs in a bank, data belongs in a data center
What took so long? How data breaches can go months without being detected
TrueCrypt not secure, its developers advise switch to BitLocker for encryption
Online Tech exhibits at Chicago internet retailing expo
Patient data collection and analytics are key to success in an accountable care organization environment
Northern Ohio HIMSS Summer Conference
Staying ahead of the cloud cybersecurity curve
iHT2 recommendations for HIPAA-compliant cloud business associates
Cloud Security at Columbus Information Security Conference
Staying ahead of the enterprise cloud backup and recovery curve
Webinar: Healthcare IT and HIPAA policy attorneys discuss risks of sharing PHI in the ACO and protection strategies
Expansion of secure, compliant hosting into Indianapolis a 'win-win-win' for current clients, future clients and Online Tech
Midwest IT executives talk innovation at Midwest Technology Leaders event
Bridging the software and infosec professional chasm
Data breaches ending careers “right to the top” of C-suite
Healthcare Compliance Association Convention in Ohio
Is the FTC enforcing better cybersecurity for data protection in non-regulated industries?
Celebrating Michigan’s metamorphosis to a digital, science and technology base
InfoSec Summit Discusses Cybersecurity Safeguards in Ohio
Online Tech Talks Cloud Security at Michigan Security Conference
Is the FTC coming after your company next? Learn how to avoid it during our next 'Tuesdays at 2' webinar series
Federal court upholds FTC’s authority to penalize lax cyber security measures protecting personal information and credit card numbers
BYOD continues to grow, continues to be a security concern
Online Tech one of CIOReview magazine's 20 Most Promising Enterprise Security Companies
Cloud security concerns persist in healthcare field, here's why data is more secure with cloud hosting provider
Metro Detroit has 'become a leader among the nation's technology economies'
Ponemon Institute: Cyber attacks up dramatically, overall breaches down slightly at healthcare organizations
Online Tech on CRN's Hosting Service Provider 100 list for secure enterprise cloud, colocation
After Target breach: CIOs under more scrutiny, getting more support
Sage advice: Healthcare space 'a great opportunity and a significant burden'
Client profile: CoherentRx uses visual display to improve retention of doctor-patient communication
Online Tech's April Sage to talk HIPAA compliance on 'Odd Tuesdays' podcast
Backup video series: What are cost-effective data backup technologies?
On-site with Online Tech at HIMSS14
Backup video series: Do you need a testing plan for data backups?
Online Tech at HIMSS14: Cloud protects PHI with encryption from front end to backup
Backup video series: How to make data backup an easier process
Security alert: Flaw in iOS could impact HIPAA and other privacy security compliance obligations
Client profile: instaRounds revolutionizes the most challenging piece of healthcare
Backup video series: The risks of using one backup solution over another
Backup video series: Why it's important to encrypt data backups
Client profile: Rimage Solutions streamlines integration and data protection for ACOs
Backup video series: What is the difference between a snapshot and full data backup?
Backup video series: What are the different ways to restore data?
Client profile: Annkissam helps nonprofits navigate their HIPAA-sensitive data
Backup video series: How often you should back up data
Healthcare IT arena buzzing with enforcement, breaches, ICD-10 conversion, BYOD and more
Backup video series: Options to think about when backing up data
HIPAA Omnibus Rule & OCR Targeting Covered Entities and Business Associates in 2014
Backup video series: What is the biggest obstacle to successful data backup plans?
Backup video series: Why many companies don't have a data backup plan
Backup video series: The difference between data backup and data replication
Online Tech Presents with Henry Ford Health System at AFCOM Meeting
Online Tech on Panel for 24x7 Exchange
Encryption is hard ... and not negotiable. We're compliant to help you be compliant.
Snapchat breach launches conversation about attention paid to security at startups
Online Tech is going to be at HIMSS 2014
Online Tech Presenting at B-Sides Columbus
2013 at Online Tech: Leadership, Growth, Innovation, Compliance, Awards and Education
Support From The Start: Online Tech's Product Manager Noah Wolff
Highly Available: Expert Interview With Noah Wark
Newest Online Tech Team Members Encompass Company’s Culture of Compliance
Target Data Breach: Roughly 40 Million Credit and Debit Card Accounts May Have Been Impacted
Protecting patient information in mobile payment apps
HIPAA-Knowledgeable Groups Get Unfortunate Lesson in PCI Compliance in Boston Data Breach
Mobile Health Concerns from the mHealth Summit
Online Tech Live Blogging From mHealth Summit
More Live-Blogging from mHealth Summit - December 9
Visit Online Tech at Booth 1112 at the 2013 mHealth Summit
Protecting Patient Data on Mobile Devices: VDI or WebApp?
Mobile Health Platform Gains Immediate Credibility with Encrypted Cloud
Webinar Review: Technical and Legal Suggestions When Implementing a BYOD Policy
The Impact of mHealth: Midwest HIMSS Conference Recap
Which State Has No PHI Breaches Reported to the HHS Wall of Shame?
Bringing Client Focus Into the 'Sticks and Bricks'
Recording: Navigating PCI Security Mountains in the Cloud
Next Week: Detroit's CIO Executive Summit Features the Future of Information Security
Adobe Hack Update: 150m+ Breached Records Now Online
HIPAA Compliant Recommendations to Securing ePHI with Mobile Devices
Lower TCO & Business Continuity Rise as Top Arguments for the Private Cloud
Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks
CIS Cyber Alert Releases Recommendations to Combat CryptoLocker Malware
2013 Mobile Security: BYOD Resource Roundup
Liveblogging from the HIMSS Midwest Area Chapters Fall Technology Conference
More New PCI DSS 3.0 Requirements: Control Access, Two-Factor Authentication & POS Security
A Lawyer and a Techie to Discuss Bring Your Own Device Policy and Security in Upcoming Webinar
Online Tech Exhibits HIPAA Hosting at Indiana Healthcare Symposium
2013 Server Security: Malware, VMs & Compliance
Highlights from Tech Tomorrow Columbus: Sustaining Business Innovation with the Cloud
Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker
Now Hiring in Michigan & the Midwest: Marketing, Sales, Tech & More
Online Tech Wins Sixth FastTrack Award from Ann Arbor SPARK
HIPAA Encryption: Protecting Patient Data on Tablets & Smartphones
Webinar with PCI SSC Discusses Emerging PCI Security Risks in the Cloud
To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization?
Online Tech Exhibits HIPAA Hosting at Midwest HIMSS Fall Technology Conference
Modernizing the Data Center: A Real Company Case Study
Online Tech Participates in Upcoming Webinar about PCI Compliance Challenges in the Cloud
Demand for Cloud Security Increases as DDoS Attacks Increase 54% in Q2
HIPAA Data Breaches Result in Hit to Patient Loyalty & High Costs
Delivering the Ultimate Data Center Customer Experience
Video: Is Data Less Secure in a Cloud Environment?
2013 Healthcare Data Breaches Cost 71% More Than The Average Data Breach
Disruptive Technology: Countering Security Challenges in the Cloud
Data Encryption Video: Challenges to Encrypting Data
SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address
SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption
Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance
Video: Data Encryption in Transit vs. at Rest
Online Tech Presents on Network Security at Detroit 2013 SecureWorld Expo
Encryption Video: What is a Virtual Private Network (VPN)?
Information Security: Your Complete Guides to Data Regulatory Compliance
What Role Does Encryption Play in Data Security?
2013 Cost of Data Breaches Increases by 78 Percent
Online Tech Joins Fortune 1000 CIOs at Detroit CIO Executive Summit
Video: How is Data Encryption Deployed Today?
Get $100 Off Secureworld Registration with Online Tech
Online Tech's Data Security Video Series: What is Data Encryption?
Online Tech Exhibits Encrypted Hosting at TechTomorrow 2013
Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach
Online Tech Nominated for MLive's 2013 Deals of the Year
Clarifying Healthcare Cloud Security Questions to Manage Patient Data Risk
Online Tech's Co-CEO Leads Discussion on Data Centers: Build vs. Buy vs. Acquire
SAN-to-SAN Replication: Fast Data Backup for the Private Cloud
PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting
HIPAA Compliant Cloud: Real Companies, Real Solutions
CEOs Discuss Encryption for Healthcare
Online Tech Heads to Indy: 2013 HCCA North Central Regional Compliance Conference
Online Tech Exhibits Encrypted HIPAA Hosting at mHealth Summit 2013
Online Tech Exhibits Encrypted HIPAA Hosting at HIMSS Midwest Tech Conference
Defense in Depth Strategy: Cloud Encryption is Just One Tool
Just Released: Encryption of Cloud Data White Paper
Get Compliant or Get Out of the Game: HIPAA's No Joke
CEO to CEO: The Importance of an Encrypted Cloud
Privacy & Security Forum Live-Blogging: A Healthcare and Security Call to Arms
Privacy & Security Forum Interview: Joy Pritts
More Live-Blogging from the HIMSS Privacy & Security Forum
Live-Blogging at the HIMSS Privacy & Security Forum
Privacy & Security Forum: Health Data Cloud Security Risks
Growing the OT Team
Privacy & Security Forum: Managing Medical Device Security Vulnerabilities
What Michigan Data Centers Can Learn From the Colorado Floods
PCI Cloud Security Webinar with PCI SSC & PCI Compliant Hosting Experts
The ‘What, Why, How and Who’ of Data Encryption for HIPAA and Meaningful Use Compliance
Great Ideas Win
Attn, Healthcare Industry: SAS 70 is No Zombie
CEOs Describe the Encrypted Cloud – A High Performance, Easy-to-Buy Machine
The Encrypted Cloud: Mission Critical Applications, Security and Regulatory Compliance
Online Tech Observes National Health IT Week (NHIT) with HIPAA Encryption Webinar
Employee Spotlight: Karen Maloney and Nick Lumsden
The Experience Matters
15 Minutes a Day – Our Investment in a Customer and Results-Oriented Culture
Mitigating EHR Downtime
Introducing: Online Tech's Encrypted Enterprise-Class Clouds
HIPAA Omnibus Rule Keynote Address at HIMSS's Privacy & Security Forum
Healthcare Regulatory Mandates Increase IT Spend to $34.5 Billion in 2014
PCI DSS Data Breaches Increase 15 Percent; Remote Access & SQL Injections to Blame
Ann Arbor SPARK's CEO on Michigan Data Centers
Social Media's Effect on HIPAA Privacy and Security
The Journey to Articulate Online Tech’s Purpose: “Exceptional People Delivering Exceptional Experiences”
Four Million Patient Records Stolen in Second Largest HIPAA Data Breach
Online Tech Exhibits at the Privacy & Security Forum
Podcast: Exceptional People Delivering Exceptional Experiences
A Look Ahead to September: Health IT, Cloud Computing/Virtualization
2013 Global InfoSec Spending to Hit $64.4 Billion
Top 5 Healthcare Cloud Security Guides
Generators Installed at our Mid-Michigan Data Center
Michigan Data Center Earthquake Risks
Solving the Encryption Dilemna
Online Tech: Still Growing Strong
Alleviating Healthcare Cloud Security Concerns
Data Center Trends: Private Clouds, Efficiency & Mobile Technology
Get Ready for HIPAA Audits with Encryption & A Risk Analysis
HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security
PCI DSS V.3.0: Risk Assessment Frameworks for Ecommerce, Mobile & Cloud Computing
Total Ecommerce Sales Rise 18 Percent in Q2 with Mobile Commerce
Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI
Two-Day Essential VMware Boot Camp on Virtualization
A Cleaner Cloud?
High-Capacity, Encrypted HIPAA Clouds for Medical Imaging Data Security
Michigan Data Centers Were Up & Running: Online Tech’s Co-CEO Reflects on 2003 Power Outage
Now Hiring in Michigan: Network, Software Engineers and System Administrators
Online Tech Exhibits HIPAA Hosting at HIMSS Privacy & Security Forum
PHI Indexed on Google? Reaffirming the Need for Business Associate HIPAA Compliance
Center for Democracy & Technology Clarifies the Healthcare Cloud
Standardizing Health Information Exchange Without Sacrificing PHI Security
HIPAA Security Lessons from a Michigan Healthcare CIO
New Technology Fuels Global PCI DSS Compliance Security Concerns
What to Look for in a HIPAA Cloud Provider
Achieving a Layered Data Security Solution for PCI DSS Compliance
EHR Vendor Contract Terms Clarified: BAAs Required
EMR Implementation: ‘It’s Not About the Technology, it’s About Managing Change’
Low Tornado Risks for Michigan Data Centers - Ideal for Disaster Recovery
No Encryption or BAAs: Keep PHI off Unsecure Clouds
International Hacking Scheme Aided by SQL Injections; 12 Major Companies, 160 Million Affected
Now Hiring in Michigan: Software Engineer
Be a Beneficiary of EMR Systems, Not a Victim
Health IT Security: Raising the Bar to Protect PHI
Encrypting Backup Data for HIPAA and PCI Compliance
How the HIPAA Cloud Protects PHI for Physician Software as a Service (SaaS)
Securing Healthcare Data in a Cost-Effective, Scalable Way
Now Hiring in Michigan: Linux & Windows Systems Administrator
Encrypting Data for Data Breach Prevention
HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned
IT Jobs Shifting to Michigan Data Centers
Security and Availability: Michigan Data Centers for Michigan Businesses
Cloud Security Report: Only 27 Percent Rely on Encrypted Cloud
Security Expert Says ‘Biggest Threat to a Company is Bad Assumptions’
Summer Webinar Series: Data Security and Health IT
Why Is It So Hard to Secure a Company? Security Expert Answers Tuesday
Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption
Encryption for the HIPAA Compliant Cloud
IDS Case Study: How the Cloud Simplifies Ecommerce
Securing Regulated Data with a Private Cloud Infrastructure
HIPAA Encryption: First Steps to Identifying and Securing Health Data
How Safe Harbor Affects Cloud Service Providers
Cloud-Based Disaster Recovery
Cyber-Theft Webinar Focuses on Data Security Challenges
Just Launched: Business Continuity and Disaster Recovery White Paper
Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level
Online Tech Receives Michigan Economic Bright Spot Award
Offsite HIPAA Data Centers are Key to Health Organization Disaster Recovery
Michigan Data Centers – Are They the Most Green Data Centers?
Encryption Webinar Series Concludes with Focus on Hardware and Storage
Tomorrow's Webinar: Encryption at the Hardware and Storage Level
Encryption at the Software Level: ‘It’s Not Always Cut-and-Dry’
Offsite Backup and IT Disaster Recovery for PCI DSS Compliance
July Webinar: Why Is It So Hard to Secure a Company?
Components of a HIPAA Compliant IT Contingency Plan
What is U.S.-EU Safe Harbor?
A Quick Tech Tutorial: Daily Log Review for PCI Compliance
Hiring in the Data Center & Cloud Computing Markets
Encryption Webinar, Part 2: Focus on Software
HIPAA Compliant Data Centers: Preventing Health Data Loss
A Quick InfoSec Tutorial: Vulnerability Scanning for HIPAA and PCI Compliance
Why, What and How to Encrypt: Security Expert Insights
IRCE: Build Your Payments Processing Ecosystem with These 10 Questions
When Data Centers Come to Town
Recap from BSides Detroit: Evolving IT Security
mHealth Trends and Strategies 2013 from AnyPresence
Online Tech Hosts Motor City ISSA (Information Systems Security Assocation) Open Meeting
Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion’ in Upcoming Webinar
IRCE 2013: Endless Adaptability: The Key to E-Commerce Success
IRCE 2013: Scalable Technology for the Retail Industry
Encryption Webinar Series Launches June 2013
IRCE 2013: Building a Complete Digital Platform with Mobile, E-Commerce & Individuality
Disabled Firewalls, Lack of Log Monitoring & Risk Analysis Lead to HIPAA Data Breach
Clarifying Levels of PCI Compliance
Gearing Up for IRCE: Michigan Business Owner Talks About Going Global
June 2-8: Celebrate D.C. Health Data & Innovation Week
Online Tech and Duo Security Team Up to Present Two-Factor Authentication Webinar
WWJ950 Interview: Cloud Computing, Healthcare IT & Entrepreneurship in Michigan
The Big Switch to Managed Services and Private Cloud
After the Cloud, What Next? Mobile Technology in Data Centers
Data Center Jobs in Michigan, Indiana and Ohio
Update from Online Tech: Major Data Center Initiatives & Investments
PCI Compliant Hosting at the Internet Retailer Conference & Exhibit (IRCE)
2013 Midwest Technology Leaders Keynote: Competencies of the New CIO
2013 MTL: Managing Innovation in Client Relations & Private Clouds
HIPAA Security Checklist for Healthcare Organizations
May Microsoft Security Updates
Encryption at the Software Level: Linux and Windows
Upcoming Webinar: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication
Online Tech’s Michigan Data Centers Use Free Cooling
Online Tech Presents on IT Security at Detroit B-Sides Security Conference
Upcoming Webinar: Encryption - Perspective on Privacy, Security & Compliance
Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats
2013 Midwest Technology Leaders Symposium Next Week in Detroit, Michigan
PCI DSS Guidance for Mobile Security Webinar: “Welcome to the Wild, Wild West of Security”
Indiana HIMSS Spring Conference: Health Reform and Future of Public Health
Tackling Healthcare CIO Challenges: Securing Infrastructure, IT Expertise and Costs
Indiana HIMSS Spring Conference: Innovations in HIT (Health Information Technology)
Online Tech Exhibits Secure Hosting the 2013 Midwest Technology Leaders Symposium
Celebrate Corporate Compliance and Ethics Week!
Michigan Data Centers Fuel State IT Industry Job Growth
PCI-Ready? Not Enough for Fully Compliant PCI Hosting
Let’s Save the Planet by Filling Up the Data Centers
2013 ETA Expo: Staying Ahead of Change in the Payments Industry
2013 ETA Expo: Government Panel Discussion
Utah Healthcare Data Breach Costs the State $9 Million
2013 ETA Expo Keynote: The Mobile Commerce Revolution
How the Data Center Industry Lowers the Carbon Footprint
PCI DSS Compliance Day at the 2013 ETA Expo Tackles Mobile Security Challenges
Pairing Cloud Computing Benefits with Security and Compliance
PCI Compliant Tips: Working With a Hosting Provider
Cloud-Based Mobile Payment Considerations at ETA Expo: PCI Compliant Cloud is Essential
2013 HCCA: The Evolving Congressional Landscape
2013 HCCA: Mobile Threats and How Healthcare Can Reduce Risks
Data Center Compliance - It’s Mission Critical! Online Tech Presents on HIPAA & PCI
2013 HCCA: Latest Trends in Data Breach Threats
Liveblogging: 2013 Health Care Compliance Association Compliance (HCCA) Institute
2013 HCCA: Cyber Compliance
2013 HCCA: Hidden Liabilities in the EHR
2013 HCCA: The Defining Moments of a Data Breach
2013 IHIMA: Lawsuits by Patients for Unauthorized Disclosure of Protected Health Information (PHI)
2013 IHIMA: State and Federal Legislative Updates on Healthcare and HITECH
2013 IHIMA: Social Media and Healthcare
Liveblogging: HIPAA Hosting at the Indiana Health Information Management Association Meeting
Online Tech Wins 2013 Corp! DiSciTech Award; Recognized for Michigan Technology Leadership
2013 IHIMA: Corporate Compliance for Healthcare
2013 IHIMA: Meaningful Use
Healthcare Data Breach Leads to Prison Time; Class Action Lawsuit
Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security & EHR Safety
2013 State of HIPAA Encryption & Authentication for Healthcare
PCI Compliance at the ETA Annual Meeting & Expo
Overcoming Healthcare CIO Challenges with Secure & Scalable HIPAA Hosting
Ensuring Business Associate Compliance: Are You Doing Your Due Diligence?
Precautions with the HIPAA Cloud for Healthcare Software as a Service (SaaS) Companies
Data Center Complexity Rises
Webinar Tomorrow at 2PM ET - PCI DSS Guidance for Mobile Security
HHS Wall of Shame: Forty Percent of 2013 HIPAA Breaches Involved Business Associates
See What’s Possible in Flint, Michigan
Online Tech Exhibits HIPAA Hosting at the 2013 Health Care Compliance Association Conference
Online Tech Exibits PCI Hosting Solutions at the Internet Retailer Conference & Exhibit (IRCE) 2013
Online Tech Exhibits HIPAA Hosting Solutions at Indiana Health Information Management Association (IHIMA)
HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally
The Next Generation Data Center: How Michigan Data Centers Fit the Bill
Online Tech Hosts Lunch & Learn on Cloud Computing for Michigan Businesses
Encrypting Health Record Data in Michigan Health Information Exchange
Could Wind Farms Power Michigan Data Centers?
Detroit Colocation: Easing the Burden of IT for Michigan Businesses
Upcoming Webinar: PCI DSS Guidance for Mobile Security
Manufacturing Driving Michigan Job Growth, High Tech Fueling Manufacturing
Interview: HIPAA Rules Effective Starting Today - Is Your HIPAA Hosting Provider Prepared?
Tech Startups In Michigan Getting Big Boost In Detroit
HIPAA Compliant Hosting Case Study with Genesys Physician Hospital Organization
HIPAA in a HITECH World: Redundant Testing for High-Availability
HIPAA in a HITECH World: HIPAA Violations on the Rise, According to Director of OCR
Upcoming Webinar: HIPAA Security and Privacy Concerns with Patient Portals
Cloud Computing Supports Southeast Michigan Tech Job Growth
Online Tech Presents on PCI & HIPAA Hosting at 7x24 Exchange in Los Angeles
Michigan – The Next Cool Thing for Data Centers
Online Tech Exhibits Michigan Hosting Solutions at 2013 Midwest Technology Leaders
Supermarket Chain Bashas' Breached While PCI Compliant
Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting
Genesco Sues Visa Over PCI Noncompliance Fines
2013 Governor's Summit Addresses Shortage of IT Talent in Michigan
Online Tech Exhibits HIPAA Hosting Solutions at HIPAA in a HITECH World in Washington, D.C.
Online Tech Shares Michigan Data Center Perspective at 2013 Governor's Economic Summit
Detroit Named No. 5 Fastest-Growing Tech City in 2012
Business Development: It’s a Good Time to Grow in the Michigan Data Center Industry
Online Tech at Forefront of Flint’s Effort to Repurpose Shuttered Auto Industry Properties
Online Tech Exhibits PCI Hosting Solutions at 2013 ETA Annual Meeting & Expo
Financial Analyst Job in Ann Arbor, Michigan
HIMSS 13: HHS Final Ruling Changes the Rules & Roles for HIPAA Hosting
Liveblogging HIMSS13: Secure Analytics in the Cloud
Liveblogging HIMSS 13: Mobile Devices: The Legal Landscape and Adopting Appropriate Policies
PCI Webinar Recap: Updates to PCI-DSS Compliance for E-Commerce and Cloud Computing Security
Liveblogging HIMSS13: Bill Clinton's Keynote
Liveblogging from HIMSS 13: Managing Privacy and Security Challenges of Patient EHR Portals
Liveblogging from HIMSS 13: Day Two!
Online Tech Presents on Cloud Computing at the West Flint, Michigan Business Association
Why Cloud Use is Rising to $131 Billion in 2013
Liveblogging HIMSS 13: Office of the National Coordinator for Health Information Technology (ONC) HIE Town Hall
Investing in Data Center Efficiencies – Part Two
Liveblogging from HIMSS 13: Day One!
Gearing Up For HIMSS 13 in New Orleans!
Investing in Data Center Efficiencies – Part One
Michigan Data Centers Reshape State's IT Landscape
Two-Factor Authentication Helps Fight Unauthorized Access
PCI Compliance Breakdown: A Tale of Two Servers
Get The Independent Audit Reports: Multi-Compliance With A Hosting Provider
Mobile Point-of-Sales (POS) Systems Increase Michigan Retail Sales
Updates to PCI-DSS Compliance for E-Commerce & Cloud Computing Security
Who Needs PCI Compliance, Exactly?
PCI Compliance Conversations With A Cloud Service Provider
Online Tech Presents at Michigan Disaster Recovery Event: Are You Prepared for a Disaster Like Sandy?
HIPAA Hosting Provider BAAs Need to Reflect HHS Final HIPAA Privacy & Security Rules
Your Cloud Hosting Provider May Be PCI Compliant But That Doesn't Mean You Are
Attackers Aim At Retail, Food Service
Michigan Physicians Benefit From HIPAA Compliant E-Prescribing
Meet Healthcare Disaster Recovery Expert: Chris Heuman at HIMSS 13!
New Industry Guidelines for Secure, PCI Compliant Mobile Payments
Meet HIPAA Law Expert, Attorney Brian Balow at HIMSS 13!
Southeastern Michigan: The Next Silicon Valley?
PCI Compliant Disaster Recovery
Michigan CIO David Behen: Michigan is the Ideal Place for Data Centers
Tackling PCI Compliance Challenges in the Cloud
Customer Privacy in Cloud Computing Contracts Key for PCI Compliance
Meet the Health IT Experts at HIMSS 13!
We're Hiring: Michigan Tech, Sales & Administrative Positions Available
PCI Compliance Supplement Gives Tips For Merchants
Final HIPAA Omnibus Rule: Business Associate Agreements & Roadmap to Compliance
Michigan Colocation: Where Should You Host Your Data?
PCI Compliant Requirements & PCI Compliant Services Matrix
Online Tech Expert Interview: What is High Availability?
Cloud Mobile Application Startups Plant Roots in Michigan
Understanding Big PCI Compliance Pitfalls
U-M Hackathon Event Encourages Michigan Mobile & Web Application Entrepreneurship
The APPS Act Addresses Mobile Security Concerns
Mobile Technology Innovation Transforming the Michigan Auto Industry
Global Mobile Trends See Rise in BYOD; Policies Lag
IT Employment Up at Online Tech's Michigan Data Centers
Data Privacy Day: Protecting Personal Privacy & Mobile Security
ACH Fraud Hurts Bank Reputations
Securing Data During Michigan's Healthcare Upheaval
Cloud Computing Use Increases Among Supply Chains
No More Excuses: HHS Releases Tough Final HIPAA Privacy and Security Rules
The Best Place to Store Your Data: When Selecting a Data Center, Location Does Matter
Online Tech Awards Scholarships to University of Michigan Students in IT
Zaxby's Breach: PCI Data Breach Due to Compromised Hard Drives
HIPAA Omnibus Rule Narrows the HIPAA Hosting Market
2013 Michigan Technology Job Trends
How the Final Omnibus Rule Affects HIPAA Cloud Computing Providers
Planning HIMSS 13: Cloud Computing in Healthcare
PCI Compliant Clouds Allow for Secure Mobile Banking
The Six Traits of Successful Companies: Michigan Entrepreneurship from Delis to Data Centers
Unencrypted Data Big Problem for Banks, Merchants
Growing Digital Health Market Requires Support of HIPAA Compliant Hosting
Why We Decided to Create a More Powerful Partnership with Co-CEOs
PCI Compliance in 2013
mHealth Security: A BYOD Case Study Excerpt from Our Mobile Security White Paper
Michigan Colocation – Consider Location, Location, Location
Mobile App & Manufacturing Tech Fuel Michigan & Detroit Economy
The Effect of Michigan Health System Mergers on Health IT
Healthcare Industry Loses $7 Billion Due to HIPAA Data Breaches
Online Tech & Comcast Business Class Co-Host Exclusive Detroit, Michigan Auto Show Event
Questions to Ask Your Colocation Provider
Mobile Security White Paper: Policies, Technology & BYOD
Breach of UofM Health System: 4K Affected
Best of 2012: HIPAA, Cloud Computing & SOC 2
Now Hiring: Michigan Technical & Sales
PCI & HIPAA Data Breaches of 2012: Lessons Learned
The Latest Federal mHealth Initiatives
Mobile POS & PCI Compliance
Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD
Secure Use of Social Media: Ensuring the Privacy of Protected Health
HIPAA? Now HIMTA: The New mHealth Bill
Small Medical Offices Big Risk to Data Security
2012 State of Mobile Health IT
Michigan Data Centers: Building Reliable Infrastructure to Strengthen the Michigan Economy
Liveblogging: Day 2 at mHealth Summit in Washington DC!
Mobile Health IT: Exhibiting HIPAA Hosting at the mHealth Summit Conference
Mobile Platform-as-a-Service (PaaS) & HIPAA Hosting
State Energy Efficiency Initiatives for Michigan Businesses
Technical Solutions to Meet the OCR HIPAA Audit Protocol
3.8 Million Tax Records Stolen in Largest State Agency Attack
Risks on the Rise: Making a Case for IT Disaster Recovery
The HIPAA Police Are On Their Way!
Another Dead End for U.S. Cybersecurity?
Online Tech Exhibits HIPAA Hosting Solutions for mHealth
State of Michigan IT Security Training Facility Opens
Global IT Spending, Cloud Computing & Top Growing Industries
Addressing the Top IT Security Issues of 2012
November Events: HIPAA Hosting in Michigan & the Midwest
Online Tech Recognized for Outstanding Business Success; Wins Fifth FastTrack Award
Online Tech President Speaks on Ann Arbor, Michigan Entrepreneurship Panel
Michigan Disaster Recovery & Hurricane Sandy: Podcast
New Positions Posted: Online Tech is Hiring in Michigan
Michigan Secure Hosting: Data Centers Safe from Hurricane Sandy
Upcoming Webinar: Applying OCR Audit Standards to HIPAA Risk Assessments
Michigan Health Information Exchange (HIE) Invests in Secure Network
Online Tech Update, Major Initiatives & Investments
Latest Federal Mobile Malware Report
Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach
Net Promoter Score Update - 10/23/12
Improving Michigan Healthcare IT Security
Online Tech Continues Midwest Tour of Health IT Conferences; Exhibiting Secure HIPAA Hosting Solutions
Online Tech Welcomes Comcast!
Advancing Michigan Business with Cloud Computing
Recommendations for Mobile Health IT Advancement
Online Tech Exhibits HIPAA Hosting Solutions at the Midwest HIMSS Fall Technology Conference
2012 Detroit SecureWorld Expo Recap
Michigan Technology and Sales Jobs
University of Michigan Targeted in Data Breach
Online Tech Exhibits at 2012 mHealth Summit in Washington, D.C.
Announcing: Your Complete Technical Security Toolkit
Data Center News Roundup
Online Tech Speaks & Exhibits at SecureWorld Expo
Secure Health Information Exchange: Preparing for a Disaster
Liveblogging from MI-HIMSS!
Online Tech to Speak at Michigan HIMSS Conference
Xen Hypervisor Exploit
Online Tech Speaks on Cloud Computing Panel
PCI Mobile Payment Security Recommendations Released by PCI SSC
What's New with Online Tech: More Data Centers on the Horizon
Liveblogging from Fall into IT!
Online Tech Radio Show on SOC 2 & Compliance
PCI Compliant Hosting for Franchises
OT Event Lineup: mHealth & Security Webinars, Livestreaming Tech Seminar
Go Daddy Suffers From Significant Outage; DNS Servers Down
National Health IT Week Kicks Off Sept. 10
8 Questions to Ask Your PCI Hosting Provider
Disaster Recovery & Backup with PCI Hosting Providers
Incident Response and 2012 Cyber Threats & Security
PCI Compliant Hosting: Data Storage Guidelines
Bring Your Own Device (BYOD) with Virtualization
How to Handle an IT Security Incident, According to NIST
Recent Medicare Changes and Physician Payment Methods
Searching Intellectual Property
Solutions for the Top 5 Security Vulnerabilities
Webinar Recap - mHealth Intellectual Property
Online Tech Sponsors Michigan HIMSS Fall Conference
Upcoming Webinar: Medicare Announcements & Physician Payment Methods
Online Tech Hosts Fall into IT: Tech Seminar
Online Tech Wins Crain's CIO of the Year Award
Accretive Health: No Liability
Upcoming Webinar: Using Cloud EMRs to Achieve Meaningful Use
Liveblogging from Chicago HIMSS! Health IT: What's Next in Digital Health?
BYOD: Mobile Healthcare Policies
August Webinar: mHealth Intellectual Property 101
Transparency with PCI Hosting Providers: Not Always Included
Cloud Computing and Compliance
Diagram of PCI Compliant Hosting Requirements
Free Webinar on the Mobile Health Cloud Today
Yahoo Data Breach Affects 450,000
Managed Care Outlook: Cloud Computing for Healthcare
The Impact of PCI DSS Compliance on Data Centers
Why Invest in PCI Hosting?
2012 HIPAA Violations and Audits
Overview of the SCOTUS Decision and Its Impact on Healthcare IT
International Credit Card Data Theft Operation Revealed
mHealth: Regulation vs. Innovation
Online Tech Featured in Crain's Detroit Business
Online Tech Exhibits SOX Compliant Hosting Solutions at MACPA Conference
Health IT Webinars With Online Tech
mHealth & Multi-Compliance
Overcoming Cloud-Based Mobility Challenges in Healthcare
Online Tech Exhibits at the Michigan Association of CPAs Event
Transparency in the Time of Data Breaches
Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale, Day 2
Upcoming Webinar: Healthcare Security Vulnerabilities
Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale
The HIPAA Omnibus Rule
HIMSS Virtual Conference: Pursuing Healthcare Transformation Through IT - Day 2
HIMSS Virtual Conference: Pursuing Healthcare Transformation Through IT
FDA Regulation of Mobile Health Devices
Online Tech Presents at KBS Technology Summit
Business Associate-Related HIPAA Violation Results in $750,000 Fines
mHealth: Mitigating Mobile Security Risks
2012 Indiana HIMSS Medical Informatics Summit Recap
Liveblogging from the HIMSS Medical Informatics Summit!
In the Wake of a Healthcare Data Breach
Upcoming Mobile Health IT and Data Security Webinars
Scholarships for IT, Computer Science and Health IT Students
Online Tech Attends HIMSS Medical Informatics Summit
Benefits of Outsourcing HIPAA Hosting
Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR
Liveblogging from Online Tech's Spring into IT Seminar!
Healthcare Organizations: Seeking a Cloud Provider? BAAs Required
Raising the Bar on Security, Reliability and Compliance
Online Tech On The Michigan Business Network
Online Tech Update: Tech Seminar, White Paper and Scholarships
Big Data: What It Means for Science, Healthcare and Social Media
NIST Recommendations for Security in the Outsourced Cloud
Spring into IT: Online Tech Hosts Tech Seminar
Online Tech to Speak at IMN Data Center Forum in NYC
HIPAA Compliant Data Center Architecture
The Impact of HITECH & HIPAA on Data Centers
U of M Ross School of Business Alumni: Cloud Computing Seminar Recap
Online Tech to Attend Chicago HIMSS Event on Health IT
HIPAA Compliant Data Centers & HIPAA Hosting White Paper
Online Tech Implements Net Promoter System
Due Diligence with Business Associates
Online Tech Sponsors iHT2 Health IT Summit
HIT 2012 Recap
HIPAA Certified vs. HIPAA Compliant
Cloud Computing on the Internet Advisor Radio Show
Online Tech to Exhibit HIPAA Hosting Solutions at HIMSS 13 in New Orleans
Stage 2 Meaningful Use Implications on HIPAA Hosting
New PCI Compliant Hosting Solutions
Server Hack Leads to HIPAA Violation by Utah Department of Health
PCI Report on Compliance
Global Payments Inc. PCI Data Breach Affects 1.5 Million
HIPAA Hosting Q&A with a Certified HIPAA Practitioner & Security Specialist
Online Tech Presents at Ann Arbor Virtualization Users Group Event
Liveblogging from HIT '12 - Day 1
Online Tech Speaks on Cloud Computing at Upcoming Healthcare IT Conference
Online Tech: First Michigan Data Center to Earn EPA’s ENERGY STAR Certification
HIT '12 Conference on Healthcare Information Transformation
Event Planning at a Data Center
Online Tech Speaks at Crain's Detroit Event on Michigan Business
Online Tech Receives Corp! Magazine's 2012 DiSciTech Award
Total Cost of a HIPAA Violation: 18.5 Million
HIPAA Cloud Hosting to Achieve Meaningful Use
PCI Compliance with Service Providers
Analyze Your Workflow Before Selecting a HIPAA Hosting Provider
PCI Compliance Status & Data Breaches
Upcoming Webinar: Cloud Computing for EHR/RCM Systems
The HIPAA Security Rule, According to the HHS (VIDEO)
SAS 70: Not Enough for HIPAA Compliance
HIMSS '12: Cloud Computing for Healthcare
Michigan HIPAA Violations
How Could Hacktivism Affect Your Business?
HIMSS '12: Lessons Learned from Healthcare Security Breaches
Day 5 – Liveblogging from HIMSS ’12!
FM-200: Fire Suppression in a Managed Data Center
Day 4 - Liveblogging from HIMSS '12!
HIPAA Cloud Hosting
Day 3 - Liveblogging from HIMSS '12!
Day 2 - Liveblogging from HIMSS '12!
Day 1 - Liveblogging from HIMSS '12!
Mobile Health App Regulations: FDA & HIPAA
Gearing Up For HIMSS '12 in Las Vegas! Online Tech Exhibits HIPAA Hosting Solutions
Business Associates Must Be HIPAA Compliant By March 2012
Last Chance: SSAE 16 & SOC Webinar
Five Questions to Ask Your Business Associate: Question #4 Disaster Recovery
The Rise of the Healthcare App Industry
HIPAA Compliance Concerns with Google
Upcoming Webinar: Making Sense of Service Organization Audits
Five Questions to Ask Your Business Associates: #3 Policies & Technologies
How Social Media Might Benefit Health Care and Be Meaningful to Patient Health
Five Questions to Ask Your Business Associate: Question #2 HIPAA Audits
Mobile Security: Are Most Apps Safe?
Update from Online Tech: Major Initiatives & Investments
Disaster Recovery for HIPAA Applications – It’s All About Availability of PHI
Tactical Mobile Device Security Measures to Meet HIPAA Compliance
Mass Digitization Threatens the IT Industry
Five Questions to Ask Your Business Associates: #1 Breach Notification
Guide to PCI Compliance Levels & Merchant Types
Online Tech Goes to Las Vegas for HIMSS 12
Recent Data Breaches Exemplify the Importance of PCI Compliance
Integrating IT Services: Cloud Computing & Compliance Concerns
Preventing a HIPAA Violation in 2012
Data Breach Results in Email Marketing Spam
Business Associates: Why Invest in a HIPAA Audit?
Top 5 Must-Read Articles for HIPAA Compliance in 2012
Keeping an Eye on Your Online Tech Services with OTPortal®
Top 5 Must-Read Articles for PCI Compliance in 2012
$999/Hour for An Amazon Cloud Server?
2012 Health IT Spending & Trends
HIPAA Safeguards Part 1: Administrative & Assigned Security Responsibility
Mobile Security: How Safe is Your Data?
Healthcare IT Priorities: Comprehensive EHRs with Simple Implementation and Low Maintenance
A SOC of A Different Color: Critical Differences Between SOC 2 and SOC 1/SSAE 16
The Sum of All Fears: From Vulnerability to Exploit, the Importance of Patch Management
Risk Assessments to Achieve PCI Compliance in the Cloud
Efficient Auditing at Online Tech
Why is a PCI Compliant Environment So Expensive?
2011 Ann Arbor Data Center Open House
Is your organization HIPAA-ready for 2012?
How a HIPAA Breach Can Negatively Impact Your Business
Last Chance to RSVP: PCI, HIPAA & Cloud Presentations
Physician Use of EMR/EHR Statistics
Online Tech Speaks at Data Security Seminar
EMR Market Trends: Cloud Computing and Economics
Upcoming Data Center Events: Ann Arbor Open House
Sutter Health HIPAA Breach: Lessons Learned
CMS Announces HIPAA 5010 Enforcement Deadline Extension
Social Media, Healthcare IT and HIPAA Law: 2011 Update
Six Steps to Transition to the Private Cloud
Midwest HIMSS 2011 Live Blogging
What’s Your 2012 IT Disaster Recovery Plan?
Upcoming HIPAA and Health IT Event: 2011 Midwest HIMSS Fall Technology Conference
What’s in a Business Associate Agreement?
2011-2012 HIPAA Audits Have Begun: Are You Ready to Prove HIPAA Compliance?
Outage Affects North America and Europe
What to Look for in a Colocation Hosting Provider
Free Webinar: Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls
The Business Associate’s Role in HIPAA Violations
Cold Site DR is Dead. Long Live Cloud-Based Disaster Recovery!
Understanding the Data Center Market in Secondary Cities & Beyond
Free Webinar: Impact of HIPAA Compliance on Business Associates
HIPAA 5010 Deadline Approaching: Taking Steps toward Implementation
What’s Missing From Most Cloud-Based Disaster Recovery? Network Replication
Online Tech to Attend HIMSS Midwest Fall Technology Conference 2011
Protecting Data with Cloud Computing Service Contracts
Upward Trend of Consumer Use of EHRs; Slower Trend of Meaningful Use Attestation
Free Webinar: Cost-Effective Protection Against HIPAA Enforcement
How Michigan Colocation Can Benefit Your Business
Cloud Computing Market Trends: Video Interview
HIPAA Compliant IT Security and Best Practices
Military Healthcare Contractor’s HIPAA Breach Followed by $4.9 Billion Lawsuit
Disaster Recovery in the Cloud: Online Tech at 7x24 Exchange's 2011 Fall Conference
HIPAA & Health IT: $872 Million in Incentives
Benefits of Managed Dedicated Servers
Nine Components of a HIPAA Risk Analysis
Nationwide Awareness Initiatives: Cyber Security and Health IT
2011 Data Center Market Trends
HIPAA Webinar Recap
2011 SMBs & Disaster Recovery in the Cloud
Lost Military Backup Tapes Results in HIPAA Violation Affecting 4.9 Million
OCR Audit Requirements Following a Self-Reported HIPAA Breach
Cheap Hosting Case Study: You Get What You Pay For (And Sometimes Not At All)
Upcoming Cloud Computing and Disaster Recovery Events
Cloud Computing Insights: Interview with TMC
HIPAA Violations By State
Passing a HIPAA Audit & Achieving HIPAA Compliant Data Centers
Prevent Increasing Costs of a Data Breach: Invest in HIPAA Hosting
Simplifying PCI Compliance with Tokenization
Compliance, Disaster Recovery & Business Sustainability: Cloud Computing for Healthcare
UPS Upgrade & Overhaul: Recommendations for a Successful UPS Upgrade
2011 Cloud & IT Disaster Recovery Statistics
SOC 1, SOC 2 & SOC 3 Report Comparison
Benefits of Cloud Computing (Virtualization) for IT Disaster Recovery
2011 PCI Compliance Statistics from Visa
Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security
2011 HIPAA Violations and Audits
Health IT Stimulus Funding Increases Demand for HIPAA Compliant Hosting
Disaster Recovery in Cloud Computing
Effects of HIPAA Breaches: Why Investing in HIPAA Compliant Hosting Makes Sense
The Cloud Computing Spectrum
PCI Compliance and Virtualization: New Recommendations
World IPv6 Day Declared a Success
SAS 70 is Dead – Long Live SOC 2 and SOC 3
SOCs and SASs: The New Standards for Service Organization Controls Reporting
Health & Human Services Getting Serious on HIPAA Violations
SAS 70, SSAE 16, SOC 2 and SOC 3 Data Center Standards
Benefits of SaaS Development in Private Cloud Computing
PCI Compliance – Advantages of Private Cloud Hosting
SaaS Value Added and Risk Management
5 SaaS Server Hosting Options
Delivering a Superior SaaS User Experience
Cloud Computing and SaaS Migration
Containerized Data Centers: In What Situations Do They Make Sense?
Enterprise Security Requirements: Is Cloud Computing There Yet?
Public Cloud or Private Cloud?
The Next Killer App for the Cloud: Business Continuity
Six Questions to Ask your Potential Server Colocation Data Center Provider
Guide to Becoming PCI Compliant: Protect Cardholder Data
How a Metric-Driven, Collaborative Company Culture Nurtures Great Customer Service
Why We Use Enterprise Drives in our Managed Dedicated Servers & Private Cloud Servers
Private Clouds Win
Guide to Becoming PCI Compliant: Build and Maintain a Secure Network
A Better Way to End Cables
What's the Future of the Data Center?
Making Life Easier for IT Executives Upgrading Their Data Centers
Cows and Data Centers? A Win-Win Solution
How to Turn A Failure into A Success
Commentary on The Evolution of Application Software Development
Online Tech is Expanding Nationally – Here’s How and Why
Online Tech Moves Headquarters
Commentary on Network World's Article on "Cisco Secures Mobile, Cloud Apps"
SaaS Drives Down The Cost of Computing In Education
How do you Measure your Managed Data Center Business?
Why You Need A SaaS Strategy - Information Week Commentary
Yan Ness Talks About Google Fiber in Ann Arbor
Data Center Skills Crisis?
Password Tools to Strengthen Your Security Online
To Build or not to Build a New Data Center?
Delivering World-Class Service in the Managed Service Provider (MSP) Industry: Why Culture Matters.
Helpful Windows Tool for "Terminal Service Connections Exceeded" Error
Guest Blog: Hosted Business Intelligence – Get in the Game
Aging Data Center: Time to Remodel or Outsource?
Operational Excellence in Managed Data Centers
How Social Media Has Helped Online Tech Improve Server Hosting Customer Service
Guide to Becoming PCI Compliant: A Historical Perspective and Introduction
Diagnose your Network Problems Quickly, Troubleshoot with Nmap
Transparency in SaaS, IaaS, and all as-a-Service Companies
Live Chat is a Great Way to Learn how to Purchase Managed Dedicated Servers
How To Get Your Support Ticket Resolved Quicker
How to Set Up a Proper Firewall Rule Set
Online Tech Customers Happy with Upgrade to Better Data Center
Why the Cloud Needs Colocation
Yan Ness Speaks About Total Cost of Ownership at Automation Alley
SAS 70 Data Centers Help Protect Against Data Breaches
What Does it Mean to be Hosted in a SAS 70 Data Center?
Online Tech Upgrades Clients to More Efficient Data Center
Has Rackspace Become a Fallen Hero?
Is Your Business Prepared for Cyber Monday Traffic?
Is a N+1 Data Center the Best Strategy for Small and Mid-Size Businesses?
Detroit Data Center
Online Tech Wins Fourth FastTrack Award
A Guide to Managed Colocation and Unmanaged Colocation
Managed Dedicated Servers or Colocation? A Look at the Spectrum of Managed IT Options
SAS 70 Type II Audit Complete for Online Tech's Data Centers
uRefer and Online Tech Sign SaaS Hosting Agreement
How Can You Be Sure That Your Customers' Application Data Is Securely & Reliably Hosted by the SaaS Provider?
Cloud Storage - More Secure and More Reliable than Tape Backup
Does Your SaaS Hosting Partner Offer Professional Incident Management & Escalation Procedures?
Online Tech Wins a Top Dedicated Server Hosting Award
What Questions Should You Ask Your SaaS Hosting Provider?
How Exactly Will the Managed Server Hosting Solutions Keep Pace With Your Business Growth?
How Does a SaaS Hosting Provider Balance Real-Time Maintenance Windows With Always-On Service?
Does Your SaaS Hosting Partner Provide 'High Availability' Managed Dedicated Servers?
Term Sheet Details - What Devils Have You Seen?
Does Your SaaS Hosting Company Understand More Than 'Ping, Power and Pipe'?
Questions to Ask a SaaS Hosting Provider
Hosting for Startups - Staying Focused
The Costs of Owning and Operating A Dedicated Server
Welcome to Our Updated Blog
What to Look for from a SAS 70 Hosting Provider
Simplified Server Monitoring for SaaS and E-commerce Hosting
Online Tech Nominated for "Technology Company Of The Year"
SaaS Increasing Data Center Demand
Online Tech Sells Website Hosting Business to IGD Solutions
Lessons Learned from the Second Rackspace Outage
Hosting Downtime and The Customer
Online Tech Offers Rackspace Customers a Soft Landing
Is SAN Replication Better Than Tape Backup?
Online Data Storage Added to Online Tech's Disaster Recovery Product Line
Klein Taking on Beedon, Linkner and Brophy in NEF's Battle of the Elevator Pitch
What is the Difference Between a Leased Server and a Dedicated Server?
Surviving a SAS-70 Audit
Morning Edition Featuring Yan Ness, CEO of Online Tech
Offsite Data Backup News: Dynamic Edge Partners with Online Tech
Online Tech Expands Focus to National Colocation Market
Cloud Computing Defintion from McKinsey & Company
Are Data Centers Cheaper Than Cloud?
Opportunity In Companies' IT Cutbacks - Crains Detroit
Colocation Rack and Stack Service
Colocate Your Satellite Data: New Service from Online Tech
Online Tech Celebrates 15 Years of Business Excellence
Is the Industry Finally Moving from Tape Backup to Online Backup?
Netstar To Resell Colocation at Online Tech’s Data Centers
Data Centers Are Bright Spot in Troubled Economy
Five Reasons to Choose a SAS-70 Audited Colocation Provider
IT Budget Cuts May Cause Data Center Disruptions
AFCOM's Five Bold Predictions for Data Centers
Online Tech First in Michigan to Complete SAS 70 Audit for All Three Data Centers
What is a SAS 70 Audit?
Data Storage - Closet Space for Data?
Effective and Affordable IT Solutions for Non-Profit Community
Is Cloud Computing a Risk You Are Willing To Take? A Cautionary Tale
Gartner Data Center Prediction Comes True
Why Do They Call It A Dedicated Server?
Michigan Benefits from Data Center Outsourcing
NEW on Helping Michigan Nonprofits
The Power of Cold in Data Centers
7 Reasons Companies Outsource Their Data Centers
Interview with Inner Circle Media
Online Technologies Rebrands its Name, Logo, and Website
Core Values: What They Mean To Online Tech
Business in Michigan: Not Everyone Struggling
New Colocation, Dedicated Servers, & Managed Data Centers Website
5 Ways Colocation Can Help Cut Costs
Colocation Data Centers Will See a Boom in 2009
Why Consider Online Data Storage over Traditional Tape Storage?
Online Tech Offers Free Services to IAS Customers Left Out in the Cold
Online Tech Wins FastTrack Award For Third Year in a Row
Universal Threat Management
Online Tech Deploys OSPF Across it's Michigan Data Centers
Colocation in Detroit Michigan
Colocation vs. Dedicated Servers
Colocation in Flint, Michigan
Dedicated Servers and Cap-Ex Free IT
Colocation and Cap-Ex Free IT
Hot-aisle/Cold-aisle Containment in Colocation
Michigan Colocation - A Cost Effective Option for Data Centers that are Out of Capacity
Data Center Demand Continues to Increase
How to Build a Cheap Dedicated Server Business
Online Tech Releases New Customer Dashboard and Monitoring Tools
Why Colocate with Online Tech?
White Pines Systems Selects Online Tech for Personal Health Records Hosting
High Availability Data Center Rack Design
Online Technologies Opens New Michigan Data Center
Managed Data Center Services
Online Technologies' CEO Wins Impact Award
Online Tech Wins 2007 Fast Track Award
Building A Virtual Data Center
Online Technologies Corporation Announces Major Build-Out
The High Availability Database Challenge
Online Tech Adds Bioscience Company to Its Growing Customer Portfolio
Disaster Recovery Plan to Keep Michigan Church Extension Fund's Data Secure
Online Tech Upgrades Giga-Bit Fiber and Network
Online Technologies Provides Internet Broadcast for Popular Michigan Radio Station 89X
Online Tech Wins 2006 Fast Track Award
Online Technologies Acquires Assets of GenTech
Moore's Law Outpaces Cooling Technology
Online Technologies Corporation Achieves Record Revenue Growth for 2005
What Does It Take To Steam Media?
The Value of Your Data
First Layer of The Internet Delivery Stack - The Physical Environment
Examining the Internet Delivery Stack
Monitoring Your Website - How Well is it Working?
Aligning Technology Resources With Business Strategy
Calculating Internet Costs Per Customer
Thank You Fleetilla!
Outsourcing Your Data Center Infrastructure