Uncategorized

Managed cloud backup vs self-managed cloud backup

Recap: Ransomware preparedness with Otava, Veeam and MSPs

Ransomware attacks up in 2020: How to protect yourself

What is Zero Trust Security?

How to Respond to the Not-So-New Iranian Cybersecurity Threat

3 IT New Year's resolutions to keep in 2020

Disaster Recovery lessons we all can learn

NCSAM: Do you Own IT? Secure IT? Protect IT?

Four Security Considerations for your Hybrid Cloud 

Famous Hacks and the Gaffes that Caused Them

What is Public Cloud Vendor Lock-in?

Demystifying Cloud Governance, Risk and Compliance

Compliance and Security Make Beautiful Bedfellows

Achieving compliance in a hybrid cloud

Achieving security in the cloud

3 Key benefits of hybrid cloud

Is hybrid cloud right for your business?

3 ways to optimize your hybrid cloud costs

Online Tech World Tour: Virginia--it's for lovers, and data centers

Online Tech World Tour: Viva Las Vegas!

Online Tech World Tour: Cheerio from Manchester!

Online Tech World Tour: Hello from Melbourne!

Online Tech World Tour: G'Day from Sydney!

Online Tech world tour: Hello from Indianapolis!

Online Tech World Tour: Greetings from Michigan!

Join Online Tech at ITEXPO

How to Protect Yourself on Data Privacy Day

Online Tech to present at IT Nation Evolve

3 Security Resolutions to Keep in 2019

Online Tech Acquires Neverfail's Cloud Business

How to Stay Safe When Shopping Online

Addressing Security Vulnerabilities in IoT Devices

Lessons Learned from the Facebook Data Breach

Visit Online Tech at the Indianapolis IT Symposium!

Azure outage affects South Central US data center

What is ISO 27001 compliance?

3 ways to prevent insider security threats

2019 cloud computing trends to look out for

Spectre and Meltdown updates

Visit Online Tech at the Indianapolis VMUG conference July 10!

Online Tech certified as ISO 27001 compliant

Machine learning + Azure: What's new?

Are you ready for GDPR?

What is edge computing?

How do the Amazon S3 bucket mistakes affect me?

Ransomware predictions for 2018

The dangers of using SMS text for two-factor authentication

Adding voice passwords to protect your accounts

What is the new WIFI vulnerability, and how do I fix it?

Understanding and stopping cloud sprawl

How to protect yourself after the Equifax data breach

What is business intelligence?

Machine learning FAQ

Azure containers and container instances

SSAE 18 vs SSAE 16: Key differences in the new SOC 1 standard

Online Tech talks hybrid cloud with Ann Arbor's WLBY radio

3 ways to control costs in Microsoft Azure

Manage cloud costs with SprawlGuard™

Cloud is sprawling unchecked, but here’s how you seize control

How containers and hybrid cloud work together

Online Tech a sponsor of 2017 inX3 conference

Ransomware attacks 74 countries, UK hospitals down

How to control Shadow IT in a hybrid cloud

Congratulations to MOBI Wireless for winning Mira's Tech Company of the Year!

Four cloud computing terms you need to know

How do the new Internet privacy rules affect you?

Mobile-based platforms in healthcare IT

The 6 best ransomware resources on the web

How to prevent data jacking

Lessons learned from AWS S3 outage: Seize control of your IT

How does Ransomware as a Service work?

The importance of infrastructure to Big Data analytics

Cybersecurity and the Internet of Things

Seven best practices for securing yourself against ransomware in 2017

The rise of X as a Service (XaaS)

What is malvertising?

Ransomware and healthcare: What you need to know

Online Tech joins Privacy Shield: What does that mean?

Congratulations to Detroit Crain’s Top 50 Names to Know in IT

How to protect your data: Four simple steps

How are you fighting Shadow IT?

Control vs consumption based IT operational models 

White House partners with Facebook, others, to encourage two-factor authentication

CIOs, beware: Rogue IT still lurks in the shadows

What caused the internet to break on Friday, Oct. 21, 2016?

Online Tech hosts webinar on virtual private clouds

Four reasons to keep disaster recovery in your IT security budget

How to avoid spear phishing bait

Containers and Docker in a nutshell

Indy Big Data conference takeaways

Online Tech at Data Connectors Indianapolis

Top 5 ways your business can manage Shadow IT

What is the future of Big Data?

What's ahead for the Internet of Things (IoT)?

How is IT as a Service (ITaaS) changing businesses?

Will DR funding survive the next economic downturn?

European Commission approves EU-US Privacy Shield

Online Tech discusses Shadow IT, cybersecurity at Grosse Pointe Yacht Club

What to look for in an offsite backup provider

Online Tech CEO to speak at data center conference

Yan Ness offers insights at IMN conference in Washington, D.C.

Platform as a Service (PaaS) FAQ

Top 5 criteria to consider in a data protection provider

Why Disaster Recovery as a Service (DRaaS) finally makes DR simple and affordable

Data is money

Lessons learned from bringing a new UPS online

Selling IT disaster recovery to your board of directors

Taking disaster recovery from complex to simple

What happens during a data center outage?

Flash, SAS or SATA storage?

Encryption is the key to the data kingdom

What is object storage?

Data virtualization: Opportunity or threat to IT?

Why Indianapolis, Indiana is a great location for data hosting

Top 5 evaluation criteria for data center selection

Investing in security: What's good for the business is good for the brand

EU announces Safe Harbor replacement coming soon

How to protect yourself against social engineering

Four reasons why if you’re in healthcare, you need encryption, even if it's not required

What role does disaster recovery play in your business continuity strategy?

What’s the value in continually investing in an IT security budget?

Michigan Data Center Tax Reform Signed into Law

Critical reasons to value your data

Get your IT security budget approved

Safeguarding Patient Data in EHRs

One key difference between cloud providers

There’s a New Compliance Cop in Town: The FTC

Defining Our Company Purpose

Online Tech Featured on IT in the D Podcast

Why Two Heads are Better than One

How to Avoid "Stranded Backup" and Get Data Back to Production

Why IP addresses are no longer free

Who's to blame in a data breach?

Meet Cloud Security Experts in Indianapolis

Get Trade Secrets of Cloud Security from World-Class Experts

Why We Built a High-Speed Encrypted Cloud

Cloud Security: Get Peace of Mind

Delivering the Ultimate Client Experience

Maintaining privacy in the cloud: culture's keeper?

Looking back: Online Tech celebrating a ‘transformational’ 2014

The Need For Disaster Recovery: Lance Thompson Talks DR

Metro Detroit Business Continuity & Disaster recovery Workshop

Why It's Important To Choose Your Backup Window

Football fever comes to Online Tech; Indianapolis data center hosting special playoff tailgate event

Getting to know our Indianapolis staff: Data Center Administrator Travis Arbogast

Start Your Business Continuity Plan With A Business Impact Analysis

New Year, New Outlook: Indianapolis Business Continuity and Disaster Recovery Workshop

Online Tech Hosts Central Indiana ISSA at Indianapolis Data Center

‘Loaded up’ Indianapolis cloud can eliminate capital outlay, extend IT team expertise and help meet compliance demands

Tales from the disaster recovery trenches result in solid business continuity advice

Online Tech guests witness 'Defense in Depth' at Joe Louis Arena

Considerations Before Initially Moving Data Offsite

Backup is the 'sweet spot' on the data protection spectrum

Mitigating the management expense of offsite backup

Indianapolis cloud brings compliance and flash-y performance

Miss our Metro Detroit Data Center open house celebration? Here's a recap

Central Indiana ISSA Holiday Party

Offsite backup and recovery questions to ask your business

Be our guest at the Metro Detroit data center grand opening today!

Coming to our Metro Detroit Data Center open house? Bring a dog bowl. (Explanation below)

Disaster recovery expert to guest host Online Tech 'Tuesdays at 2' webinar

Please consider joining Online Tech in supporting Feeding America this holiday season

Michigan Council of Women in Technology Event

Giving unlikely thanks? How about your auditor?

20th anniversary: Thoughts from Online Tech co-founder Gary Baker on the company's evolution

Collaboration At The 12th Annual Detroit CIO Executive Summit

Where Offsite Backup and Recovery Fits in the Data Protection Spectrum

Offsite Backup, Onsite Backup, or Both?

Major retail data breaches continue; do consumers care?

Infographic: HIPAA and Meaningful Use

Open house on Dec. 2: Check out Metro Detroit's newest data center

Recap: Online Tech celebrates opening of new Indianapolis data center

Join Online Tech at cloud-focused TechEx in Detroit on Wednesday

Offsite backup and recovery: Understanding the hidden costs

We spent HOW much time to restore that backup file? Significantly less with file-level restoration

TechPoint is driving Indiana’s technology growth

Online Tech part of webinar presentation of 5 tools to protect patient data

Backing up sensitive data for recovery? Meet Mr. FIPS

7 questions to keep your offsite backup and recovery out of the outhouse

5 tools to protect patient data

Client profile: Baseline Data Services serious about disaster recovery

Bringing secure, compliant hosting to Indianapolis

Online Tech's April Sage, attorney Tatiana Melnik presenting on challenges and opportunities of cloud computing at AHIMA conference

Visit the grand opening of our Indianapolis data center on Oct. 23

Michigan HIMSS 2014 Fall Conference

7 business drivers for your backup and recovery strategy

Keeping cybercrime secrets despite increasing data breach reports

3 questions your CIO needs to answer to set your offsite backup strategy

Largest HIPAA breach ever: Hackers steal data on 4.5 million Community Health Systems patients

U.S. internet connection speed lacking overall, Michigan among top 10 fastest states

Improving security on the 'Internet of Things'

Russian hackers steal more than 1 billion passwords in record-breaking data breach

Data breach reporting: A job killer or business saver?

The next big retail fraud? Jimmy John’s investigating possible data breach

Want a good job? Study computer or information science

Online Tech opens its doors to fast-growing tech hub of Metro Detroit

Americans agree government must do more to protect data, but can the government act?

Don’t Strand your Data (Stranded Backups)

IT-as-a-Service: Need for speed and drive to align is changing operating model

Experts: Be fast and forthcoming with details of a data breach

Data protection and the cloud

Friend or foe? Cybersecurity risks for shared data and a few precautions

Shift in ownership of IT dollars: Competition makes everyone better

Smitten with the mitten: Online Tech honored for improving economy in state of Michigan

Another U.S. retailer discovers the real cost of card holder data theft: customer loyalty

Data is money: Just as money belongs in a bank, data belongs in a data center

What took so long? How data breaches can go months without being detected

TrueCrypt not secure, its developers advise switch to BitLocker for encryption

Online Tech exhibits at Chicago internet retailing expo

Patient data collection and analytics are key to success in an accountable care organization environment

Northern Ohio HIMSS Summer Conference

Staying ahead of the cloud cybersecurity curve

iHT2 recommendations for HIPAA-compliant cloud business associates

Cloud Security at Columbus Information Security Conference

Staying ahead of the enterprise cloud backup and recovery curve

Webinar: Healthcare IT and HIPAA policy attorneys discuss risks of sharing PHI in the ACO and protection strategies

Expansion of secure, compliant hosting into Indianapolis a 'win-win-win' for current clients, future clients and Online Tech

Midwest IT executives talk innovation at Midwest Technology Leaders event

Bridging the software and infosec professional chasm

Data breaches ending careers “right to the top” of C-suite

Healthcare Compliance Association Convention in Ohio

Is the FTC enforcing better cybersecurity for data protection in non-regulated industries?

Celebrating Michigan’s metamorphosis to a digital, science and technology base

InfoSec Summit Discusses Cybersecurity Safeguards in Ohio

Online Tech Talks Cloud Security at Michigan Security Conference

Is the FTC coming after your company next? Learn how to avoid it during our next 'Tuesdays at 2' webinar series

Federal court upholds FTC’s authority to penalize lax cyber security measures protecting personal information and credit card numbers

BYOD continues to grow, continues to be a security concern

Online Tech one of CIOReview magazine's 20 Most Promising Enterprise Security Companies

Cloud security concerns persist in healthcare field, here's why data is more secure with cloud hosting provider

Metro Detroit has 'become a leader among the nation's technology economies'

Ponemon Institute: Cyber attacks up dramatically, overall breaches down slightly at healthcare organizations

Online Tech on CRN's Hosting Service Provider 100 list for secure enterprise cloud, colocation

After Target breach: CIOs under more scrutiny, getting more support

Sage advice: Healthcare space 'a great opportunity and a significant burden'

Client profile: CoherentRx uses visual display to improve retention of doctor-patient communication

Online Tech's April Sage to talk HIPAA compliance on 'Odd Tuesdays' podcast

Backup video series: What are cost-effective data backup technologies?

On-site with Online Tech at HIMSS14

Backup video series: Do you need a testing plan for data backups?

Online Tech at HIMSS14: Cloud protects PHI with encryption from front end to backup

Backup video series: How to make data backup an easier process

Security alert: Flaw in iOS could impact HIPAA and other privacy security compliance obligations

Client profile: instaRounds revolutionizes the most challenging piece of healthcare

Backup video series: The risks of using one backup solution over another

Backup video series: Why it's important to encrypt data backups

Client profile: Rimage Solutions streamlines integration and data protection for ACOs

Backup video series: What is the difference between a snapshot and full data backup?

Backup video series: What are the different ways to restore data?

Client profile: Annkissam helps nonprofits navigate their HIPAA-sensitive data

Backup video series: How often you should back up data

Healthcare IT arena buzzing with enforcement, breaches, ICD-10 conversion, BYOD and more

Backup video series: Options to think about when backing up data

HIPAA Omnibus Rule & OCR Targeting Covered Entities and Business Associates in 2014

Backup video series: What is the biggest obstacle to successful data backup plans?

Backup video series: Why many companies don't have a data backup plan

Backup video series: The difference between data backup and data replication

Online Tech Presents with Henry Ford Health System at AFCOM Meeting

Online Tech on Panel for 24x7 Exchange

Encryption is hard ... and not negotiable. We're compliant to help you be compliant.

Snapchat breach launches conversation about attention paid to security at startups

Online Tech is going to be at HIMSS 2014

Online Tech Presenting at B-Sides Columbus

2013 at Online Tech: Leadership, Growth, Innovation, Compliance, Awards and Education

Support From The Start: Online Tech's Product Manager Noah Wolff

Highly Available: Expert Interview With Noah Wark

Newest Online Tech Team Members Encompass Company’s Culture of Compliance

Target Data Breach: Roughly 40 Million Credit and Debit Card Accounts May Have Been Impacted

Protecting patient information in mobile payment apps

HIPAA-Knowledgeable Groups Get Unfortunate Lesson in PCI Compliance in Boston Data Breach

Mobile Health Concerns from the mHealth Summit

Online Tech Live Blogging From mHealth Summit

More Live-Blogging from mHealth Summit - December 9

Visit Online Tech at Booth 1112 at the 2013 mHealth Summit

Protecting Patient Data on Mobile Devices: VDI or WebApp?

Mobile Health Platform Gains Immediate Credibility with Encrypted Cloud

Webinar Review: Technical and Legal Suggestions When Implementing a BYOD Policy

The Impact of mHealth: Midwest HIMSS Conference Recap

Which State Has No PHI Breaches Reported to the HHS Wall of Shame?

Bringing Client Focus Into the 'Sticks and Bricks'

Recording: Navigating PCI Security Mountains in the Cloud

Next Week: Detroit's CIO Executive Summit Features the Future of Information Security

Adobe Hack Update: 150m+ Breached Records Now Online

HIPAA Compliant Recommendations to Securing ePHI with Mobile Devices

Lower TCO & Business Continuity Rise as Top Arguments for the Private Cloud

Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks

CIS Cyber Alert Releases Recommendations to Combat CryptoLocker Malware

2013 Mobile Security: BYOD Resource Roundup

Liveblogging from the HIMSS Midwest Area Chapters Fall Technology Conference

More New PCI DSS 3.0 Requirements: Control Access, Two-Factor Authentication & POS Security

A Lawyer and a Techie to Discuss Bring Your Own Device Policy and Security in Upcoming Webinar

Online Tech Exhibits HIPAA Hosting at Indiana Healthcare Symposium

2013 Server Security: Malware, VMs & Compliance

Highlights from Tech Tomorrow Columbus: Sustaining Business Innovation with the Cloud

Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker

Now Hiring in Michigan & the Midwest: Marketing, Sales, Tech & More

Online Tech Wins Sixth FastTrack Award from Ann Arbor SPARK

HIPAA Encryption: Protecting Patient Data on Tablets & Smartphones

Webinar with PCI SSC Discusses Emerging PCI Security Risks in the Cloud

To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization?

Online Tech Exhibits HIPAA Hosting at Midwest HIMSS Fall Technology Conference

Modernizing the Data Center: A Real Company Case Study

Online Tech Participates in Upcoming Webinar about PCI Compliance Challenges in the Cloud

Demand for Cloud Security Increases as DDoS Attacks Increase 54% in Q2

HIPAA Data Breaches Result in Hit to Patient Loyalty & High Costs

Delivering the Ultimate Data Center Customer Experience

Video: Is Data Less Secure in a Cloud Environment?

2013 Healthcare Data Breaches Cost 71% More Than The Average Data Breach

Disruptive Technology: Countering Security Challenges in the Cloud

Data Encryption Video: Challenges to Encrypting Data

SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address

SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption

Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance

Video: Data Encryption in Transit vs. at Rest

Online Tech Presents on Network Security at Detroit 2013 SecureWorld Expo

Encryption Video: What is a Virtual Private Network (VPN)?

Information Security: Your Complete Guides to Data Regulatory Compliance

What Role Does Encryption Play in Data Security?

2013 Cost of Data Breaches Increases by 78 Percent

Online Tech Joins Fortune 1000 CIOs at Detroit CIO Executive Summit

Video: How is Data Encryption Deployed Today?

Get $100 Off Secureworld Registration with Online Tech

Online Tech's Data Security Video Series: What is Data Encryption?

Online Tech Exhibits Encrypted Hosting at TechTomorrow 2013

Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach

Online Tech Nominated for MLive's 2013 Deals of the Year

Clarifying Healthcare Cloud Security Questions to Manage Patient Data Risk

Online Tech's Co-CEO Leads Discussion on Data Centers: Build vs. Buy vs. Acquire

SAN-to-SAN Replication: Fast Data Backup for the Private Cloud

PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting

HIPAA Compliant Cloud: Real Companies, Real Solutions

CEOs Discuss Encryption for Healthcare

Online Tech Heads to Indy: 2013 HCCA North Central Regional Compliance Conference

Online Tech Exhibits Encrypted HIPAA Hosting at mHealth Summit 2013

Online Tech Exhibits Encrypted HIPAA Hosting at HIMSS Midwest Tech Conference

Defense in Depth Strategy: Cloud Encryption is Just One Tool

Just Released: Encryption of Cloud Data White Paper

Get Compliant or Get Out of the Game: HIPAA's No Joke

CEO to CEO: The Importance of an Encrypted Cloud

Privacy & Security Forum Live-Blogging: A Healthcare and Security Call to Arms

Privacy & Security Forum Interview: Joy Pritts

More Live-Blogging from the HIMSS Privacy & Security Forum

Live-Blogging at the HIMSS Privacy & Security Forum

Privacy & Security Forum: Health Data Cloud Security Risks

Growing the OT Team

Privacy & Security Forum: Managing Medical Device Security Vulnerabilities

What Michigan Data Centers Can Learn From the Colorado Floods

PCI Cloud Security Webinar with PCI SSC & PCI Compliant Hosting Experts

The ‘What, Why, How and Who’ of Data Encryption for HIPAA and Meaningful Use Compliance

Great Ideas Win

Attn, Healthcare Industry: SAS 70 is No Zombie

CEOs Describe the Encrypted Cloud – A High Performance, Easy-to-Buy Machine

The Encrypted Cloud: Mission Critical Applications, Security and Regulatory Compliance

Online Tech Observes National Health IT Week (NHIT) with HIPAA Encryption Webinar

Employee Spotlight: Karen Maloney and Nick Lumsden

The Experience Matters

15 Minutes a Day – Our Investment in a Customer and Results-Oriented Culture

Mitigating EHR Downtime

Introducing: Online Tech's Encrypted Enterprise-Class Clouds

HIPAA Omnibus Rule Keynote Address at HIMSS's Privacy & Security Forum

Healthcare Regulatory Mandates Increase IT Spend to $34.5 Billion in 2014

PCI DSS Data Breaches Increase 15 Percent; Remote Access & SQL Injections to Blame

Ann Arbor SPARK's CEO on Michigan Data Centers

Social Media's Effect on HIPAA Privacy and Security

The Journey to Articulate Online Tech’s Purpose: “Exceptional People Delivering Exceptional Experiences”

Four Million Patient Records Stolen in Second Largest HIPAA Data Breach

Online Tech Exhibits at the Privacy & Security Forum

Podcast: Exceptional People Delivering Exceptional Experiences

A Look Ahead to September: Health IT, Cloud Computing/Virtualization

2013 Global InfoSec Spending to Hit $64.4 Billion

Top 5 Healthcare Cloud Security Guides

Generators Installed at our Mid-Michigan Data Center

Michigan Data Center Earthquake Risks

Solving the Encryption Dilemna

Online Tech: Still Growing Strong

Alleviating Healthcare Cloud Security Concerns

Data Center Trends: Private Clouds, Efficiency & Mobile Technology

Get Ready for HIPAA Audits with Encryption & A Risk Analysis

HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security

PCI DSS V.3.0: Risk Assessment Frameworks for Ecommerce, Mobile & Cloud Computing

Total Ecommerce Sales Rise 18 Percent in Q2 with Mobile Commerce

Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI

Two-Day Essential VMware Boot Camp on Virtualization

A Cleaner Cloud?

High-Capacity, Encrypted HIPAA Clouds for Medical Imaging Data Security

Michigan Data Centers Were Up & Running: Online Tech’s Co-CEO Reflects on 2003 Power Outage

Now Hiring in Michigan: Network, Software Engineers and System Administrators

Online Tech Exhibits HIPAA Hosting at HIMSS Privacy & Security Forum

PHI Indexed on Google? Reaffirming the Need for Business Associate HIPAA Compliance

Center for Democracy & Technology Clarifies the Healthcare Cloud

Standardizing Health Information Exchange Without Sacrificing PHI Security

HIPAA Security Lessons from a Michigan Healthcare CIO

New Technology Fuels Global PCI DSS Compliance Security Concerns

What to Look for in a HIPAA Cloud Provider

Achieving a Layered Data Security Solution for PCI DSS Compliance

EHR Vendor Contract Terms Clarified: BAAs Required

EMR Implementation: ‘It’s Not About the Technology, it’s About Managing Change’

Low Tornado Risks for Michigan Data Centers - Ideal for Disaster Recovery

No Encryption or BAAs: Keep PHI off Unsecure Clouds

International Hacking Scheme Aided by SQL Injections; 12 Major Companies, 160 Million Affected

Now Hiring in Michigan: Software Engineer

Be a Beneficiary of EMR Systems, Not a Victim

Health IT Security: Raising the Bar to Protect PHI

Encrypting Backup Data for HIPAA and PCI Compliance

How the HIPAA Cloud Protects PHI for Physician Software as a Service (SaaS)

Securing Healthcare Data in a Cost-Effective, Scalable Way

Now Hiring in Michigan: Linux & Windows Systems Administrator

Encrypting Data for Data Breach Prevention

HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned

IT Jobs Shifting to Michigan Data Centers

Security and Availability: Michigan Data Centers for Michigan Businesses

Cloud Security Report: Only 27 Percent Rely on Encrypted Cloud

Security Expert Says ‘Biggest Threat to a Company is Bad Assumptions’

Summer Webinar Series: Data Security and Health IT

Why Is It So Hard to Secure a Company? Security Expert Answers Tuesday

Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption

Encryption for the HIPAA Compliant Cloud

IDS Case Study: How the Cloud Simplifies Ecommerce

Securing Regulated Data with a Private Cloud Infrastructure

HIPAA Encryption: First Steps to Identifying and Securing Health Data

How Safe Harbor Affects Cloud Service Providers

Cloud-Based Disaster Recovery

Cyber-Theft Webinar Focuses on Data Security Challenges

Just Launched: Business Continuity and Disaster Recovery White Paper

Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level

Online Tech Receives Michigan Economic Bright Spot Award

Offsite HIPAA Data Centers are Key to Health Organization Disaster Recovery

Michigan Data Centers – Are They the Most Green Data Centers?

Encryption Webinar Series Concludes with Focus on Hardware and Storage

Tomorrow's Webinar: Encryption at the Hardware and Storage Level

Encryption at the Software Level: ‘It’s Not Always Cut-and-Dry’

Offsite Backup and IT Disaster Recovery for PCI DSS Compliance

July Webinar: Why Is It So Hard to Secure a Company?

Components of a HIPAA Compliant IT Contingency Plan

What is U.S.-EU Safe Harbor?

A Quick Tech Tutorial: Daily Log Review for PCI Compliance

Hiring in the Data Center & Cloud Computing Markets

Encryption Webinar, Part 2: Focus on Software

HIPAA Compliant Data Centers: Preventing Health Data Loss

A Quick InfoSec Tutorial: Vulnerability Scanning for HIPAA and PCI Compliance

Why, What and How to Encrypt: Security Expert Insights

IRCE: Build Your Payments Processing Ecosystem with These 10 Questions

When Data Centers Come to Town

Recap from BSides Detroit: Evolving IT Security

mHealth Trends and Strategies 2013 from AnyPresence

Online Tech Hosts Motor City ISSA (Information Systems Security Assocation) Open Meeting

Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion’ in Upcoming Webinar

IRCE 2013: Endless Adaptability: The Key to E-Commerce Success

IRCE 2013: Scalable Technology for the Retail Industry

Encryption Webinar Series Launches June 2013

IRCE 2013: Building a Complete Digital Platform with Mobile, E-Commerce & Individuality

Disabled Firewalls, Lack of Log Monitoring & Risk Analysis Lead to HIPAA Data Breach

Clarifying Levels of PCI Compliance

Gearing Up for IRCE: Michigan Business Owner Talks About Going Global

June 2-8: Celebrate D.C. Health Data & Innovation Week

Online Tech and Duo Security Team Up to Present Two-Factor Authentication Webinar

WWJ950 Interview: Cloud Computing, Healthcare IT & Entrepreneurship in Michigan

The Big Switch to Managed Services and Private Cloud

After the Cloud, What Next? Mobile Technology in Data Centers

Data Center Jobs in Michigan, Indiana and Ohio

Update from Online Tech: Major Data Center Initiatives & Investments

PCI Compliant Hosting at the Internet Retailer Conference & Exhibit (IRCE)

2013 Midwest Technology Leaders Keynote: Competencies of the New CIO

2013 MTL: Managing Innovation in Client Relations & Private Clouds

HIPAA Security Checklist for Healthcare Organizations

May Microsoft Security Updates

Encryption at the Software Level: Linux and Windows

Upcoming Webinar: The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication

Online Tech’s Michigan Data Centers Use Free Cooling

Online Tech Presents on IT Security at Detroit B-Sides Security Conference

Upcoming Webinar: Encryption - Perspective on Privacy, Security & Compliance

Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats

2013 Midwest Technology Leaders Symposium Next Week in Detroit, Michigan

PCI DSS Guidance for Mobile Security Webinar: “Welcome to the Wild, Wild West of Security”

Indiana HIMSS Spring Conference: Health Reform and Future of Public Health

Tackling Healthcare CIO Challenges: Securing Infrastructure, IT Expertise and Costs

Indiana HIMSS Spring Conference: Innovations in HIT (Health Information Technology)

Online Tech Exhibits Secure Hosting the 2013 Midwest Technology Leaders Symposium

Celebrate Corporate Compliance and Ethics Week!

Michigan Data Centers Fuel State IT Industry Job Growth

PCI-Ready? Not Enough for Fully Compliant PCI Hosting

Let’s Save the Planet by Filling Up the Data Centers

2013 ETA Expo: Staying Ahead of Change in the Payments Industry

2013 ETA Expo: Government Panel Discussion

Utah Healthcare Data Breach Costs the State $9 Million

2013 ETA Expo Keynote: 
The Mobile Commerce Revolution

How the Data Center Industry Lowers the Carbon Footprint

PCI DSS Compliance Day at the 2013 ETA Expo Tackles Mobile Security Challenges

Pairing Cloud Computing Benefits with Security and Compliance

PCI Compliant Tips: Working With a Hosting Provider

Cloud-Based Mobile Payment Considerations at ETA Expo: PCI Compliant Cloud is Essential

2013 HCCA: The Evolving Congressional Landscape

2013 HCCA: Mobile Threats and How Healthcare Can Reduce Risks

Data Center Compliance - It’s Mission Critical! Online Tech Presents on HIPAA & PCI

2013 HCCA: Latest Trends in Data Breach Threats

Liveblogging: 2013 Health Care Compliance Association Compliance (HCCA) Institute

2013 HCCA: Cyber Compliance

2013 HCCA: Hidden Liabilities in the EHR

2013 HCCA: The Defining Moments of a Data Breach

2013 IHIMA: Lawsuits by Patients for Unauthorized Disclosure of Protected Health Information (PHI)

2013 IHIMA: State and Federal Legislative Updates on Healthcare and HITECH

2013 IHIMA: Social Media and Healthcare

Liveblogging: HIPAA Hosting at the Indiana Health Information Management Association Meeting

Online Tech Wins 2013 Corp! DiSciTech Award; Recognized for Michigan Technology Leadership

2013 IHIMA: Corporate Compliance for Healthcare

2013 IHIMA: Meaningful Use

Healthcare Data Breach Leads to Prison Time; Class Action Lawsuit

Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security & EHR Safety

2013 State of HIPAA Encryption & Authentication for Healthcare

PCI Compliance at the ETA Annual Meeting & Expo

Overcoming Healthcare CIO Challenges with Secure & Scalable HIPAA Hosting

Ensuring Business Associate Compliance: Are You Doing Your Due Diligence?

Precautions with the HIPAA Cloud for Healthcare Software as a Service (SaaS) Companies

Data Center Complexity Rises

Webinar Tomorrow at 2PM ET - PCI DSS Guidance for Mobile Security

HHS Wall of Shame: Forty Percent of 2013 HIPAA Breaches Involved Business Associates

See What’s Possible in Flint, Michigan

Online Tech Exhibits HIPAA Hosting at the 2013 Health Care Compliance Association Conference

Online Tech Exibits PCI Hosting Solutions at the Internet Retailer Conference & Exhibit (IRCE) 2013

Online Tech Exhibits HIPAA Hosting Solutions at Indiana Health Information Management Association (IHIMA)

HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally

The Next Generation Data Center: How Michigan Data Centers Fit the Bill

Online Tech Hosts Lunch & Learn on Cloud Computing for Michigan Businesses

Encrypting Health Record Data in Michigan Health Information Exchange

Could Wind Farms Power Michigan Data Centers?

Detroit Colocation: Easing the Burden of IT for Michigan Businesses

Upcoming Webinar: PCI DSS Guidance for Mobile Security

Manufacturing Driving Michigan Job Growth, High Tech Fueling Manufacturing

Interview: HIPAA Rules Effective Starting Today - Is Your HIPAA Hosting Provider Prepared?

Tech Startups In Michigan Getting Big Boost In Detroit

HIPAA Compliant Hosting Case Study with Genesys Physician Hospital Organization

HIPAA in a HITECH World: Redundant Testing for High-Availability

HIPAA in a HITECH World: HIPAA Violations on the Rise, According to Director of OCR

Upcoming Webinar: HIPAA Security and Privacy Concerns with Patient Portals

Cloud Computing Supports Southeast Michigan Tech Job Growth

Online Tech Presents on PCI & HIPAA Hosting at 7x24 Exchange in Los Angeles

Michigan – The Next Cool Thing for Data Centers

Online Tech Exhibits Michigan Hosting Solutions at 2013 Midwest Technology Leaders

Supermarket Chain Bashas' Breached While PCI Compliant

Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting

Genesco Sues Visa Over PCI Noncompliance Fines

2013 Governor's Summit Addresses Shortage of IT Talent in Michigan

Online Tech Exhibits HIPAA Hosting Solutions at HIPAA in a HITECH World in Washington, D.C.

Online Tech Shares Michigan Data Center Perspective at 2013 Governor's Economic Summit

Detroit Named No. 5 Fastest-Growing Tech City in 2012

Business Development: It’s a Good Time to Grow in the Michigan Data Center Industry

Online Tech at Forefront of Flint’s Effort to Repurpose Shuttered Auto Industry Properties

Online Tech Exhibits PCI Hosting Solutions at 2013 ETA Annual Meeting & Expo

Financial Analyst Job in Ann Arbor, Michigan

HIMSS 13: HHS Final Ruling Changes the Rules & Roles for HIPAA Hosting

Liveblogging HIMSS13: Secure Analytics in the Cloud

Liveblogging HIMSS 13: Mobile Devices: The Legal Landscape and Adopting Appropriate Policies

PCI Webinar Recap: Updates to PCI-DSS Compliance for E-Commerce and Cloud Computing Security

Liveblogging HIMSS13: Bill Clinton's Keynote

Liveblogging from HIMSS 13: Managing Privacy and Security Challenges of Patient EHR Portals

Liveblogging from HIMSS 13: Day Two!

Online Tech Presents on Cloud Computing at the West Flint, Michigan Business Association

Why Cloud Use is Rising to $131 Billion in 2013

Liveblogging HIMSS 13: Office of the National Coordinator for Health Information Technology (ONC) HIE Town Hall

Investing in Data Center Efficiencies – Part Two

Liveblogging from HIMSS 13: Day One!

Gearing Up For HIMSS 13 in New Orleans!

Investing in Data Center Efficiencies – Part One

Michigan Data Centers Reshape State's IT Landscape

Two-Factor Authentication Helps Fight Unauthorized Access

PCI Compliance Breakdown: A Tale of Two Servers

Get The Independent Audit Reports: Multi-Compliance With A Hosting Provider

Mobile Point-of-Sales (POS) Systems Increase Michigan Retail Sales

Updates to PCI-DSS Compliance for E-Commerce & Cloud Computing Security

Who Needs PCI Compliance, Exactly?

PCI Compliance Conversations With A Cloud Service Provider

Online Tech Presents at Michigan Disaster Recovery Event: Are You Prepared for a Disaster Like Sandy?

HIPAA Hosting Provider BAAs Need to Reflect HHS Final HIPAA Privacy & Security Rules

Your Cloud Hosting Provider May Be PCI Compliant But That Doesn't Mean You Are

Attackers Aim At Retail, Food Service

Michigan Physicians Benefit From HIPAA Compliant E-Prescribing

Meet Healthcare Disaster Recovery Expert: Chris Heuman at HIMSS 13!

New Industry Guidelines for Secure, PCI Compliant Mobile Payments

Meet HIPAA Law Expert, Attorney Brian Balow at HIMSS 13!

Southeastern Michigan: The Next Silicon Valley?

PCI Compliant Disaster Recovery

Michigan CIO David Behen: Michigan is the Ideal Place for Data Centers

Tackling PCI Compliance Challenges in the Cloud

Customer Privacy in Cloud Computing Contracts Key for PCI Compliance

Meet the Health IT Experts at HIMSS 13!

We're Hiring: Michigan Tech, Sales & Administrative Positions Available

PCI Compliance Supplement Gives Tips For Merchants

Final HIPAA Omnibus Rule: Business Associate Agreements & Roadmap to Compliance

Michigan Colocation: Where Should You Host Your Data?

PCI Compliant Requirements & PCI Compliant Services Matrix

Online Tech Expert Interview: What is High Availability?

Cloud Mobile Application Startups Plant Roots in Michigan

Understanding Big PCI Compliance Pitfalls

U-M Hackathon Event Encourages Michigan Mobile & Web Application Entrepreneurship

The APPS Act Addresses Mobile Security Concerns

Mobile Technology Innovation Transforming the Michigan Auto Industry

Global Mobile Trends See Rise in BYOD; Policies Lag

IT Employment Up at Online Tech's Michigan Data Centers

Data Privacy Day: Protecting Personal Privacy & Mobile Security

ACH Fraud Hurts Bank Reputations

Securing Data During Michigan's Healthcare Upheaval

Cloud Computing Use Increases Among Supply Chains

No More Excuses: HHS Releases Tough Final HIPAA Privacy and Security Rules

The Best Place to Store Your Data: When Selecting a Data Center, Location Does Matter

Online Tech Awards Scholarships to University of Michigan Students in IT

Zaxby's Breach: PCI Data Breach Due to Compromised Hard Drives

HIPAA Omnibus Rule Narrows the HIPAA Hosting Market

2013 Michigan Technology Job Trends

How the Final Omnibus Rule Affects HIPAA Cloud Computing Providers

Planning HIMSS 13: Cloud Computing in Healthcare

PCI Compliant Clouds Allow for Secure Mobile Banking

The Six Traits of Successful Companies: Michigan Entrepreneurship from Delis to Data Centers

Unencrypted Data Big Problem for Banks, Merchants

Growing Digital Health Market Requires Support of HIPAA Compliant Hosting

Why We Decided to Create a More Powerful Partnership with Co-CEOs

PCI Compliance in 2013

mHealth Security: A BYOD Case Study Excerpt from Our Mobile Security White Paper

Michigan Colocation – Consider Location, Location, Location

Mobile App & Manufacturing Tech Fuel Michigan & Detroit Economy

The Effect of Michigan Health System Mergers on Health IT

Healthcare Industry Loses $7 Billion Due to HIPAA Data Breaches

Online Tech & Comcast Business Class Co-Host Exclusive Detroit, Michigan Auto Show Event

Questions to Ask Your Colocation Provider

Mobile Security White Paper: Policies, Technology & BYOD

Breach of UofM Health System: 4K Affected

Best of 2012: HIPAA, Cloud Computing & SOC 2

Now Hiring: Michigan Technical & Sales

PCI & HIPAA Data Breaches of 2012: Lessons Learned

The Latest Federal mHealth Initiatives

Mobile POS & PCI Compliance

Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD

Secure Use of Social Media: Ensuring the Privacy of Protected Health

HIPAA? Now HIMTA: The New mHealth Bill

Small Medical Offices Big Risk to Data Security

2012 State of Mobile Health IT

Michigan Data Centers: Building Reliable Infrastructure to Strengthen the Michigan Economy

Liveblogging: Day 2 at mHealth Summit in Washington DC!

Mobile Health IT: Exhibiting HIPAA Hosting at the mHealth Summit Conference

Mobile Platform-as-a-Service (PaaS) & HIPAA Hosting

State Energy Efficiency Initiatives for Michigan Businesses

Technical Solutions to Meet the OCR HIPAA Audit Protocol

3.8 Million Tax Records Stolen in Largest State Agency Attack

Risks on the Rise: Making a Case for IT Disaster Recovery

The HIPAA Police Are On Their Way!

Another Dead End for U.S. Cybersecurity?

Online Tech Exhibits HIPAA Hosting Solutions for mHealth

State of Michigan IT Security Training Facility Opens

Global IT Spending, Cloud Computing & Top Growing Industries

Addressing the Top IT Security Issues of 2012

November Events: HIPAA Hosting in Michigan & the Midwest

Online Tech Recognized for Outstanding Business Success; Wins Fifth FastTrack Award

Online Tech President Speaks on Ann Arbor, Michigan Entrepreneurship Panel

Michigan Disaster Recovery & Hurricane Sandy: Podcast

New Positions Posted: Online Tech is Hiring in Michigan

Michigan Secure Hosting: Data Centers Safe from Hurricane Sandy

Upcoming Webinar: Applying OCR Audit Standards to HIPAA Risk Assessments

Michigan Health Information Exchange (HIE) Invests in Secure Network

Online Tech Update, Major Initiatives & Investments

Latest Federal Mobile Malware Report

Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach

Net Promoter Score Update - 10/23/12

Improving Michigan Healthcare IT Security

Hello world!

Online Tech Continues Midwest Tour of Health IT Conferences; Exhibiting Secure HIPAA Hosting Solutions

Online Tech Welcomes Comcast!

Advancing Michigan Business with Cloud Computing

Recommendations for Mobile Health IT Advancement

Online Tech Exhibits HIPAA Hosting Solutions at the Midwest HIMSS Fall Technology Conference

2012 Detroit SecureWorld Expo Recap

Michigan Technology and Sales Jobs

University of Michigan Targeted in Data Breach

Online Tech Exhibits at 2012 mHealth Summit in Washington, D.C.

Announcing: Your Complete Technical Security Toolkit

Data Center News Roundup

Online Tech Speaks & Exhibits at SecureWorld Expo

Secure Health Information Exchange: Preparing for a Disaster

Liveblogging from MI-HIMSS!

Online Tech to Speak at Michigan HIMSS Conference

Xen Hypervisor Exploit

Online Tech Speaks on Cloud Computing Panel

PCI Mobile Payment Security Recommendations Released by PCI SSC

What's New with Online Tech: More Data Centers on the Horizon

Liveblogging from Fall into IT!

Online Tech Radio Show on SOC 2 & Compliance

PCI Compliant Hosting for Franchises

OT Event Lineup: mHealth & Security Webinars, Livestreaming Tech Seminar

Go Daddy Suffers From Significant Outage; DNS Servers Down

National Health IT Week Kicks Off Sept. 10

8 Questions to Ask Your PCI Hosting Provider

Disaster Recovery & Backup with PCI Hosting Providers

Incident Response and 2012 Cyber Threats & Security

PCI Compliant Hosting: Data Storage Guidelines

Bring Your Own Device (BYOD) with Virtualization

How to Handle an IT Security Incident, According to NIST

Recent Medicare Changes and Physician Payment Methods

Searching Intellectual Property

Solutions for the Top 5 Security Vulnerabilities

Webinar Recap - mHealth Intellectual Property

Online Tech Sponsors Michigan HIMSS Fall Conference

Upcoming Webinar: Medicare Announcements & Physician Payment Methods

Online Tech Hosts Fall into IT: Tech Seminar

Online Tech Wins Crain's CIO of the Year Award

Accretive Health: No Liability

Upcoming Webinar: Using Cloud EMRs to Achieve Meaningful Use

Liveblogging from Chicago HIMSS! Health IT: What's Next in Digital Health?

BYOD: Mobile Healthcare Policies

August Webinar: mHealth Intellectual Property 101

Transparency with PCI Hosting Providers: Not Always Included

Cloud Computing and Compliance

Diagram of PCI Compliant Hosting Requirements

Free Webinar on the Mobile Health Cloud Today

Yahoo Data Breach Affects 450,000

Managed Care Outlook: Cloud Computing for Healthcare

The Impact of PCI DSS Compliance on Data Centers

Why Invest in PCI Hosting?

2012 HIPAA Violations and Audits

Overview of the SCOTUS Decision and Its Impact on Healthcare IT

International Credit Card Data Theft Operation Revealed

mHealth: Regulation vs. Innovation

Online Tech Featured in Crain's Detroit Business

Online Tech Exhibits SOX Compliant Hosting Solutions at MACPA Conference

Health IT Webinars With Online Tech

mHealth & Multi-Compliance

Overcoming Cloud-Based Mobility Challenges in Healthcare

Online Tech Exhibits at the Michigan Association of CPAs Event

Transparency in the Time of Data Breaches

Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale, Day 2

Upcoming Webinar: Healthcare Security Vulnerabilities

Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale

The HIPAA Omnibus Rule

HIMSS Virtual Conference: Pursuing Healthcare Transformation Through IT - Day 2

HIMSS Virtual Conference: Pursuing Healthcare Transformation Through IT

FDA Regulation of Mobile Health Devices

Online Tech Presents at KBS Technology Summit

Business Associate-Related HIPAA Violation Results in $750,000 Fines

mHealth: Mitigating Mobile Security Risks

2012 Indiana HIMSS Medical Informatics Summit Recap

Liveblogging from the HIMSS Medical Informatics Summit!

In the Wake of a Healthcare Data Breach

Upcoming Mobile Health IT and Data Security Webinars

Scholarships for IT, Computer Science and Health IT Students

Online Tech Attends HIMSS Medical Informatics Summit

Benefits of Outsourcing HIPAA Hosting

Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR

Liveblogging from Online Tech's Spring into IT Seminar!

Healthcare Organizations: Seeking a Cloud Provider? BAAs Required

Raising the Bar on Security, Reliability and Compliance

Online Tech On The Michigan Business Network

Online Tech Update: Tech Seminar, White Paper and Scholarships

Big Data: What It Means for Science, Healthcare and Social Media

NIST Recommendations for Security in the Outsourced Cloud

Spring into IT: Online Tech Hosts Tech Seminar

Online Tech to Speak at IMN Data Center Forum in NYC

HIPAA Compliant Data Center Architecture

The Impact of HITECH & HIPAA on Data Centers

U of M Ross School of Business Alumni: Cloud Computing Seminar Recap

Online Tech to Attend Chicago HIMSS Event on Health IT

HIPAA Compliant Data Centers & HIPAA Hosting White Paper

Online Tech Implements Net Promoter System

Due Diligence with Business Associates

Online Tech Sponsors iHT2 Health IT Summit

HIT 2012 Recap

HIPAA Certified vs. HIPAA Compliant

Cloud Computing on the Internet Advisor Radio Show

Online Tech to Exhibit HIPAA Hosting Solutions at HIMSS 13 in New Orleans

Stage 2 Meaningful Use Implications on HIPAA Hosting

New PCI Compliant Hosting Solutions

Server Hack Leads to HIPAA Violation by Utah Department of Health

PCI Report on Compliance

Global Payments Inc. PCI Data Breach Affects 1.5 Million

HIPAA Hosting Q&A with a Certified HIPAA Practitioner & Security Specialist

Online Tech Presents at Ann Arbor Virtualization Users Group Event

Liveblogging from HIT '12 - Day 1

Online Tech Speaks on Cloud Computing at Upcoming Healthcare IT Conference

Online Tech: First Michigan Data Center to Earn EPA’s ENERGY STAR Certification

HIT '12 Conference on Healthcare Information Transformation

Event Planning at a Data Center

Online Tech Speaks at Crain's Detroit Event on Michigan Business

Online Tech Receives Corp! Magazine's 2012 DiSciTech Award

Total Cost of a HIPAA Violation: 18.5 Million

HIPAA Cloud Hosting to Achieve Meaningful Use

PCI Compliance with Service Providers

Analyze Your Workflow Before Selecting a HIPAA Hosting Provider

PCI Compliance Status & Data Breaches

Upcoming Webinar: Cloud Computing for EHR/RCM Systems

The HIPAA Security Rule, According to the HHS (VIDEO)

SAS 70: Not Enough for HIPAA Compliance

HIMSS '12: Cloud Computing for Healthcare

Michigan HIPAA Violations

How Could Hacktivism Affect Your Business?

HIMSS '12: Lessons Learned from Healthcare Security Breaches

Day 5 – Liveblogging from HIMSS ’12!

FM-200: Fire Suppression in a Managed Data Center

Day 4 - Liveblogging from HIMSS '12!

HIPAA Cloud Hosting

Day 3 - Liveblogging from HIMSS '12!

Day 2 - Liveblogging from HIMSS '12!

Day 1 - Liveblogging from HIMSS '12!

Mobile Health App Regulations: FDA & HIPAA

Gearing Up For HIMSS '12 in Las Vegas! Online Tech Exhibits HIPAA Hosting Solutions

Business Associates Must Be HIPAA Compliant By March 2012

Last Chance: SSAE 16 & SOC Webinar

Five Questions to Ask Your Business Associate: Question #4 Disaster Recovery

The Rise of the Healthcare App Industry

HIPAA Compliance Concerns with Google

Upcoming Webinar: Making Sense of Service Organization Audits

Five Questions to Ask Your Business Associates: #3 Policies & Technologies

How Social Media Might Benefit Health Care and Be Meaningful to Patient Health

Five Questions to Ask Your Business Associate: Question #2 HIPAA Audits

Mobile Security: Are Most Apps Safe?

Update from Online Tech: Major Initiatives & Investments

Disaster Recovery for HIPAA Applications – It’s All About Availability of PHI

Tactical Mobile Device Security Measures to Meet HIPAA Compliance

Mass Digitization Threatens the IT Industry

Five Questions to Ask Your Business Associates: #1 Breach Notification

Guide to PCI Compliance Levels & Merchant Types

Online Tech Goes to Las Vegas for HIMSS 12

Recent Data Breaches Exemplify the Importance of PCI Compliance

Integrating IT Services: Cloud Computing & Compliance Concerns

Preventing a HIPAA Violation in 2012

Data Breach Results in Email Marketing Spam

Business Associates: Why Invest in a HIPAA Audit?

Top 5 Must-Read Articles for HIPAA Compliance in 2012

Keeping an Eye on Your Online Tech Services with OTPortal®

Top 5 Must-Read Articles for PCI Compliance in 2012

$999/Hour for An Amazon Cloud Server?

2012 Health IT Spending & Trends

HIPAA Safeguards Part 1: Administrative & Assigned Security Responsibility

Mobile Security: How Safe is Your Data?

Healthcare IT Priorities: Comprehensive EHRs with Simple Implementation and Low Maintenance

A SOC of A Different Color: Critical Differences Between SOC 2 and SOC 1/SSAE 16

The Sum of All Fears: From Vulnerability to Exploit, the Importance of Patch Management

Risk Assessments to Achieve PCI Compliance in the Cloud

Efficient Auditing at Online Tech

Why is a PCI Compliant Environment So Expensive?

2011 Ann Arbor Data Center Open House

Is your organization HIPAA-ready for 2012?

How a HIPAA Breach Can Negatively Impact Your Business

Last Chance to RSVP: PCI, HIPAA & Cloud Presentations

Physician Use of EMR/EHR Statistics

Online Tech Speaks at Data Security Seminar

EMR Market Trends: Cloud Computing and Economics

Upcoming Data Center Events: Ann Arbor Open House

Sutter Health HIPAA Breach: Lessons Learned

CMS Announces HIPAA 5010 Enforcement Deadline Extension

Social Media, Healthcare IT and HIPAA Law: 2011 Update

Six Steps to Transition to the Private Cloud

Midwest HIMSS 2011 Live Blogging

What’s Your 2012 IT Disaster Recovery Plan?

Upcoming HIPAA and Health IT Event: 2011 Midwest HIMSS Fall Technology Conference

What’s in a Business Associate Agreement?

2011-2012 HIPAA Audits Have Begun: Are You Ready to Prove HIPAA Compliance?

Outage Affects North America and Europe

What to Look for in a Colocation Hosting Provider

Free Webinar: Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls

The Business Associate’s Role in HIPAA Violations

Cold Site DR is Dead. Long Live Cloud-Based Disaster Recovery!

Understanding the Data Center Market in Secondary Cities & Beyond

Free Webinar: Impact of HIPAA Compliance on Business Associates

HIPAA 5010 Deadline Approaching: Taking Steps toward Implementation

What’s Missing From Most Cloud-Based Disaster Recovery? Network Replication

Online Tech to Attend HIMSS Midwest Fall Technology Conference 2011

Protecting Data with Cloud Computing Service Contracts

Upward Trend of Consumer Use of EHRs; Slower Trend of Meaningful Use Attestation

Free Webinar: Cost-Effective Protection Against HIPAA Enforcement

How Michigan Colocation Can Benefit Your Business

Cloud Computing Market Trends: Video Interview

HIPAA Compliant IT Security and Best Practices

Military Healthcare Contractor’s HIPAA Breach Followed by $4.9 Billion Lawsuit

Disaster Recovery in the Cloud: Online Tech at 7x24 Exchange's 2011 Fall Conference

HIPAA & Health IT: $872 Million in Incentives

Benefits of Managed Dedicated Servers

Nine Components of a HIPAA Risk Analysis

Nationwide Awareness Initiatives: Cyber Security and Health IT

2011 Data Center Market Trends

HIPAA Webinar Recap

2011 SMBs & Disaster Recovery in the Cloud

Lost Military Backup Tapes Results in HIPAA Violation Affecting 4.9 Million

OCR Audit Requirements Following a Self-Reported HIPAA Breach

Cheap Hosting Case Study: You Get What You Pay For (And Sometimes Not At All)

Upcoming Cloud Computing and Disaster Recovery Events

Cloud Computing Insights: Interview with TMC

HIPAA Violations By State

Passing a HIPAA Audit & Achieving HIPAA Compliant Data Centers

Prevent Increasing Costs of a Data Breach: Invest in HIPAA Hosting

Simplifying PCI Compliance with Tokenization

Compliance, Disaster Recovery & Business Sustainability: Cloud Computing for Healthcare

UPS Upgrade & Overhaul: Recommendations for a Successful UPS Upgrade

2011 Cloud & IT Disaster Recovery Statistics

SOC 1, SOC 2 & SOC 3 Report Comparison

Benefits of Cloud Computing (Virtualization) for IT Disaster Recovery

2011 PCI Compliance Statistics from Visa

Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security

2011 HIPAA Violations and Audits

Health IT Stimulus Funding Increases Demand for HIPAA Compliant Hosting

Disaster Recovery in Cloud Computing

Effects of HIPAA Breaches: Why Investing in HIPAA Compliant Hosting Makes Sense

The Cloud Computing Spectrum

PCI Compliance and Virtualization: New Recommendations

World IPv6 Day Declared a Success

SAS 70 is Dead – Long Live SOC 2 and SOC 3

SOCs and SASs: The New Standards for Service Organization Controls Reporting

Health & Human Services Getting Serious on HIPAA Violations

SAS 70, SSAE 16, SOC 2 and SOC 3 Data Center Standards

Benefits of SaaS Development in Private Cloud Computing

PCI Compliance – Advantages of Private Cloud Hosting

Michigan Colocation

SaaS Value Added and Risk Management

5 SaaS Server Hosting Options

Delivering a Superior SaaS User Experience

Cloud Computing and SaaS Migration

Containerized Data Centers: In What Situations Do They Make Sense?

Enterprise Security Requirements: Is Cloud Computing There Yet?

Public Cloud or Private Cloud?

The Next Killer App for the Cloud: Business Continuity

Six Questions to Ask your Potential Server Colocation Data Center Provider

Guide to Becoming PCI Compliant: Protect Cardholder Data

How a Metric-Driven, Collaborative Company Culture Nurtures Great Customer Service

Why We Use Enterprise Drives in our Managed Dedicated Servers & Private Cloud Servers

Private Clouds Win

Guide to Becoming PCI Compliant: Build and Maintain a Secure Network

A Better Way to End Cables

What's the Future of the Data Center?

Making Life Easier for IT Executives Upgrading Their Data Centers

Cows and Data Centers? A Win-Win Solution

How to Turn A Failure into A Success

Commentary on The Evolution of Application Software Development

Online Tech is Expanding Nationally – Here’s How and Why

Online Tech Moves Headquarters

Commentary on Network World's Article on "Cisco Secures Mobile, Cloud Apps"

SaaS Drives Down The Cost of Computing In Education

How do you Measure your Managed Data Center Business?

Why You Need A SaaS Strategy - Information Week Commentary

Yan Ness Talks About Google Fiber in Ann Arbor

Data Center Skills Crisis?

Password Tools to Strengthen Your Security Online

To Build or not to Build a New Data Center?

Delivering World-Class Service in the Managed Service Provider (MSP) Industry: Why Culture Matters.

Helpful Windows Tool for "Terminal Service Connections Exceeded" Error

Guest Blog: Hosted Business Intelligence – Get in the Game

Aging Data Center: Time to Remodel or Outsource?

Operational Excellence in Managed Data Centers

How Social Media Has Helped Online Tech Improve Server Hosting Customer Service

Guide to Becoming PCI Compliant: A Historical Perspective and Introduction

Diagnose your Network Problems Quickly, Troubleshoot with Nmap

Transparency in SaaS, IaaS, and all as-a-Service Companies

Live Chat is a Great Way to Learn how to Purchase Managed Dedicated Servers

How To Get Your Support Ticket Resolved Quicker

How to Set Up a Proper Firewall Rule Set

Online Tech Customers Happy with Upgrade to Better Data Center

Why the Cloud Needs Colocation

Yan Ness Speaks About Total Cost of Ownership at Automation Alley

Detroit Colocation

SAS 70 Data Centers Help Protect Against Data Breaches

What Does it Mean to be Hosted in a SAS 70 Data Center?

Online Tech Upgrades Clients to More Efficient Data Center

Has Rackspace Become a Fallen Hero?

Is Your Business Prepared for Cyber Monday Traffic?

Is a N+1 Data Center the Best Strategy for Small and Mid-Size Businesses?

Detroit Data Center

Online Tech Wins Fourth FastTrack Award

A Guide to Managed Colocation and Unmanaged Colocation

Managed Dedicated Servers or Colocation? A Look at the Spectrum of Managed IT Options

SAS 70 Type II Audit Complete for Online Tech's Data Centers

uRefer and Online Tech Sign SaaS Hosting Agreement

How Can You Be Sure That Your Customers' Application Data Is Securely & Reliably Hosted by the SaaS Provider?

Cloud Storage - More Secure and More Reliable than Tape Backup

Does Your SaaS Hosting Partner Offer Professional Incident Management & Escalation Procedures?

Online Tech Wins a Top Dedicated Server Hosting Award

What Questions Should You Ask Your SaaS Hosting Provider?

How Exactly Will the Managed Server Hosting Solutions Keep Pace With Your Business Growth?

How Does a SaaS Hosting Provider Balance Real-Time Maintenance Windows With Always-On Service?

Does Your SaaS Hosting Partner Provide 'High Availability' Managed Dedicated Servers?

Term Sheet Details - What Devils Have You Seen?

Does Your SaaS Hosting Company Understand More Than 'Ping, Power and Pipe'?

Questions to Ask a SaaS Hosting Provider

Hosting for Startups - Staying Focused

The Costs of Owning and Operating A Dedicated Server

Welcome to Our Updated Blog

What to Look for from a SAS 70 Hosting Provider

Simplified Server Monitoring for SaaS and E-commerce Hosting

Online Tech Nominated for "Technology Company Of The Year"

SaaS Increasing Data Center Demand

Online Tech Sells Website Hosting Business to IGD Solutions

Lessons Learned from the Second Rackspace Outage

Hosting Downtime and The Customer

Online Tech Offers Rackspace Customers a Soft Landing

Is SAN Replication Better Than Tape Backup?

Online Data Storage Added to Online Tech's Disaster Recovery Product Line

Why Colocation?

Klein Taking on Beedon, Linkner and Brophy in NEF's Battle of the Elevator Pitch

What is the Difference Between a Leased Server and a Dedicated Server?

Surviving a SAS-70 Audit

Morning Edition Featuring Yan Ness, CEO of Online Tech

Offsite Data Backup News: Dynamic Edge Partners with Online Tech

Online Tech Expands Focus to National Colocation Market

Cloud Computing Defintion from McKinsey & Company

Are Data Centers Cheaper Than Cloud?

Opportunity In Companies' IT Cutbacks - Crains Detroit

Colocation Rack and Stack Service

Colocate Your Satellite Data: New Service from Online Tech

Online Tech Celebrates 15 Years of Business Excellence

Is the Industry Finally Moving from Tape Backup to Online Backup?

Netstar To Resell Colocation at Online Tech’s Data Centers

Data Centers Are Bright Spot in Troubled Economy

Five Reasons to Choose a SAS-70 Audited Colocation Provider

IT Budget Cuts May Cause Data Center Disruptions

AFCOM's Five Bold Predictions for Data Centers

Online Tech First in Michigan to Complete SAS 70 Audit for All Three Data Centers

What is a SAS 70 Audit?

Data Storage - Closet Space for Data?

Effective and Affordable IT Solutions for Non-Profit Community

Is Cloud Computing a Risk You Are Willing To Take? A Cautionary Tale

Gartner Data Center Prediction Comes True

Why Do They Call It A Dedicated Server?

Michigan Benefits from Data Center Outsourcing

NEW on Helping Michigan Nonprofits

The Power of Cold in Data Centers

7 Reasons Companies Outsource Their Data Centers

Interview with Inner Circle Media

Online Technologies Rebrands its Name, Logo, and Website

Core Values: What They Mean To Online Tech

Business in Michigan: Not Everyone Struggling

New Colocation, Dedicated Servers, & Managed Data Centers Website

5 Ways Colocation Can Help Cut Costs

Colocation Data Centers Will See a Boom in 2009

Why Consider Online Data Storage over Traditional Tape Storage?

Online Tech Offers Free Services to IAS Customers Left Out in the Cold

Online Tech Wins FastTrack Award For Third Year in a Row

Universal Threat Management

Online Tech Deploys OSPF Across it's Michigan Data Centers

Colocation in Detroit Michigan

Colocation vs. Dedicated Servers

Colocation in Flint, Michigan

Dedicated Servers and Cap-Ex Free IT

Colocation and Cap-Ex Free IT

Hot-aisle/Cold-aisle Containment in Colocation

Michigan Colocation - A Cost Effective Option for Data Centers that are Out of Capacity

Data Center Demand Continues to Increase

How to Build a Cheap Dedicated Server Business

Online Tech Releases New Customer Dashboard and Monitoring Tools

Why Colocate with Online Tech?

White Pines Systems Selects Online Tech for Personal Health Records Hosting

High Availability Data Center Rack Design

Online Technologies Opens New Michigan Data Center

Managed Data Center Services

Online Technologies' CEO Wins Impact Award

Online Tech Wins 2007 Fast Track Award

Building A Virtual Data Center

Online Technologies Corporation Announces Major Build-Out

The High Availability Database Challenge

Online Tech Adds Bioscience Company to Its Growing Customer Portfolio

Disaster Recovery Plan to Keep Michigan Church Extension Fund's Data Secure

Online Tech Upgrades Giga-Bit Fiber and Network

Online Technologies Provides Internet Broadcast for Popular Michigan Radio Station 89X

Online Tech Wins 2006 Fast Track Award

Online Technologies Acquires Assets of GenTech

Moore's Law Outpaces Cooling Technology

Online Technologies Corporation Achieves Record Revenue Growth for 2005

What Does It Take To Steam Media?

The Value of Your Data

First Layer of The Internet Delivery Stack - The Physical Environment

Examining the Internet Delivery Stack

Monitoring Your Website - How Well is it Working?

Aligning Technology Resources With Business Strategy

Calculating Internet Costs Per Customer

Thank You Fleetilla!

Outsourcing Your Data Center Infrastructure