• Search
  • Support
  • Login
  • Contact
  • Careers
  • 877-740-5028
  • Solutions
    • Cloud
      • Gen3 Cloud
      • Private Cloud
      • Public Cloud
      • Cloud Storage
    • Data Protection
      • Disaster Recovery as a Service
      • Otava DRaaS powered by VMware
      • Cloud Backup
        • Otava Cloud Backup for Microsoft 365
        • Otava Cloud Connect Powered by Veeam
        • Managed Cloud Backup, powered by Veeam
        • Self-Managed Cloud Backup, powered by Veeam
    • Security
    • Professional Services
    • Colocation
  • Operations
    • Locations
      • Michigan Data Centers
      • Indianapolis (IN1)
      • Las Vegas Hosting (NV1)
      • Virginia (VA4)
      • Austin
      • Sydney (SY4)
      • Melbourne (ME1)
      • Manchester (MA3)
    • Cloud Operations
  • Compliance
    • HIPAA Compliance
    • PCI Compliance
    • SOC 1 & 2 & 3
    • ISO 27001 Compliant Hosting
  • Results
    • Legendary Stories
    • Testimonials
    • Awards
  • Partner
    • Partner Programs
    • Current Partners
      • Affiliate Partners
  • About
    • Why Otava
    • Our Team
    • Careers
    • Blog
    • Resources
      • Case studies
      • White Papers
      • Videos
      • References
    • Press
    • Events
  • Close

Topic:data breach

Covering the latest industry trends and an excellent source of thought leadership.

Read More

Posted3.18.21by Laurel Burtonpost
CLOUD BACKUP

Data Offsite Backup and the Recent Microsoft Exchange Attack

Depending upon your perspective, Hafnium is either a metal that is an excellent absorber of neutrons used in nuclear control rods, or, if you are one of the estimated 60,000+ ...

Posted3.18.21by Laurel Burtonpost

Read More

Posted3.11.21by Laurel Burtonpost
CYBERSECURITY

If you’re in the Cloud, you should know about Pentesting and Cybercrime

Penetration testing or pentesting, sometimes categorized as ethical hacking (the difference is usually stated as finding vulnerabilities and security risks versus using variou...

Posted3.11.21by Laurel Burtonpost

Read More

Posted12.22.20by Carrie Kennedypost
CYBERSECURITY

Otava Update on the Recent Hack of Government Agencies

On December 17, 2020 a joint statement from the Cyber Unified Coordination Group (UCG), a joint response group composed of the FBI, CISA, and ODNI, revealed the UCG has “becom...

Posted12.22.20by Carrie Kennedypost

Read More

Posted12.19.20by Carrie Kennedypost
CYBERSECURITY

Recommendations for Enterprise Organizations

In a recent Secret Service Information Alert a warning is delivered that “The United States Secret Service is continuing to see an increase in the number of cyber related atta...

Posted12.19.20by Carrie Kennedypost

Read More

Posted11.18.20by Carrie Kennedypost
CYBERSECURITY

Cyber-attacks on Healthcare Continue Unabated

In just the past few weeks news reports show that the rate of cyber-crime targeted at healthcare and the public health sector has risen dramatically. An analysis of the increa...

Posted11.18.20by Carrie Kennedypost

Read More

Posted8.6.20by Carrie Kennedypost
Analysis

Tackling the rising costs of cybercrime and data leakage

If the average, all-inclusive cost [2019] to business for a data breach is $3.9M, then the issue of data and record security gains more relevance for all sizes of businesses....

Posted8.6.20by Carrie Kennedypost

Read More

Posted4.27.20by Carrie Kennedypost
Protecting Your Business from

Third Party Breaches

In the areas of technology and compliance, third parties create a special set of challenges. Third parties are your vendors, business partners, and a significant part of your ...

Posted4.27.20by Carrie Kennedypost

Connect

  • 877-740-5028
  • Careers
  • Contact
  • About

Explore

  • Press
  • Case Studies
  • White Papers
  • Partner Program
  • Login

Legal

  • Legal Notices
  • Rules of Use
  • Acceptable Use Policy
  • Privacy Policy