Sign up | Login with →

Posts by April Sage Subscribe

Largest HIPAA Breach Ever: Hackers Steal Data on 4.5 Million Community Health Systems Patients

There’s a new leader on the U.S. Department of Health & Human Services’ Wall of Shame.A hacking group known as “APT 18” is suspected of stealing names, Social Security numbers, addresses, birthdays and telephone numbers from 4.5 million patients...

Posted August 21, 2014    

Improving Security on the Internet of Things

Mark Stanislav calls himself a “security evangelist.” Online Tech has previously provided him a virtual pulpit from which to preach and his barnstorming tour continued last week in Las Vegas, where he spoke at the recently concluded DEF CON 22...

Posted August 13, 2014    

Russian Hackers Steal More Than 1 Billion Passwords in Record-Breaking Data Breach

Hold Security, a firm credited with uncovering significant data breaches – such as the one at Adobe Systems in October 2013 – has uncovered a record-breaking hack of 1.2 billion username and passwords from multiple websites.From the Hold Security...

Posted August 7, 2014    

Data Breach Reporting: A Job Killer or Business Saver?

There’s quite a brouhaha bubbling up Down Under.It all stems from a Sydney Morning Herald opinion piece written by the CEO of the Association of Data Driven Marketing and Advertising opposing the mandatory data breach reporting law introduced to the...

Posted August 3, 2014    

Cloud Security Concerns Persist in Healthcare Field: Data Is More Secure With Cloud Hosting Provider

When the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy & Data Security was released earlier this month, it stated that use of cloud services is the second-highest security risk concern for healthcare organizations.Employee...

Posted April 3, 2014    

Metro Detroit Has "Become a Leader Among the Nation's Technology Economies"

The automotive capital of the world has “quietly become a leader among the nation’s technology economies,” says an Automation Alley’s 2014 Technology Industry Report released today.According to media reports, the study shows Metro Detroit tech...

Posted March 28, 2014    

The Risks of Using One Backup Solution Over Another [VIDEO]

Note: This is the ninth in a 12-part data backup video series by Online Tech Senior Product Architect Steve Aiello. View the previous entries here.We’ve covered many possible data backup solutions in this video series. Whatever backup solution you...

Posted February 24, 2014    

Contrary to Popular Belief, Cloud Computing a Boon for Professional IT Jobs

Remember years ago when the prevailing thought was that the proliferation of cloud computing would decimate professional IT jobs? As the folks at VMware point out in a recent blog post, just the opposite appears to have happened:Never before have...

Posted February 20, 2014    

Top 10 Tips for Securely Managing BYOD in the Workplace

For more BYOD information, check out a replay of a past Online Tech webinar co-hosted by Tatiana Melnik, an attorney concentrating her practice on IT, data privacy and security, and regulatory compliance, “To be BYOD or not to be BYOD: Is a Bring...

Posted February 9, 2014    

Managing Cyber Security Threats from Inside

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. This post is by Tom Olzak, a security researcher for the InfoSec Institute and an IT professional with over 27 years of experience in...

Posted December 30, 2013    

Adobe Hack Update: 150m+ Breached Records Now Online

Although the updated Adobe hack number was last reported at 38 million users, Paul Ducklin of Sopho’s Naked Security blog has reported 150 million breached records have been found in a database dump online. While the passwords are encrypted,...

Posted November 15, 2013    

CIS Cyber Alert Releases Recommendations to Combat CryptoLocker Malware

Last week I wrote about CryptoLocker in Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker, the well-known malware that is categorized as ‘ransomware’ – it encrypts files on your computer and refuses to decrypt until you pay...

Posted November 14, 2013