Call Us (877) 740-5028
We stay ahead of the latest industry trends, updates, and innovations so you don’t have to. From cloud compliance to disaster recovery, we’ve got you covered.
A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network…
We’re still hiring up a storm in the Midwest, as the managed data center and cloud computing markets are growing…
Online Tech’s month-long, in-depth look at encryption continues at 2 p.m. Tuesday, June 18, with the free informational and technical…
According to HealthDataManagement.com, a laptop that may have operating room information on nearly 13,000 pediatric patients was stolen from a…
Vulnerability scanning is an automated tool used for assessing security weaknesses. Online Tech recommends monthly vulnerability scans to regularly identify…
Not sure if your organization’s sensitive data is properly encrypted? It’s time to be sure. Chris Heuman, Practice Leader for…
Last week Online Tech exhibited at booth #108 at the IRCE show in Chicago. With two consecutive days of jam-packed…
I have written a lot about what companies should look for in a location when deciding to build or partner…
We’re cloud experts, so you don’t have to be.