All businesses monitor costs and look for ways to improve the bottom line. You may be the one responsible for finding the most cost-effective means to maintain a critical IT infrastructure. If so, have you considered managed hosting? Not only can managed hosting provide the highest levels of reliability and security, but it can also … read more
A disaster recovery (DR) plan is an essential part of your company’s Business Continuity Plan (BCP), the living document that details how your organization guards against future disasters—ranging from viruses to terrorist attacks to hurricanes and natural disasters. And while people often use the terms business continuity and disaster recovery interchangeably, the two mean very … read more
National Health IT (NHIT) Week takes place on September 26-30, 2016, and is a collaborative forum and virtual awareness event created to highlight the necessity of advancing health through the best use of information technology (IT). At OnRamp, we recognize the critical role health IT holds in the advancement and improvement of healthcare in the … read more
When it comes to cybersecurity and securing our sensitive data, high-speed technological change has conditioned us to think the biggest risks come from some new-to-the-world vulnerability. For instance, we hear warnings that mobile attacks will be the next scourge or that the Internet of Things (IoT) is the emerging danger zone.
But, let’s not jump … read more
The rise of cloud-based computing and Software as a Service (SaaS) has turned the entire channel partner ecosystem upside down. Technology buyers, sellers, and resellers face ongoing disruptive innovations that are changing the dynamics of the IT channel significantly, broadly—and permanently. This reality, and the issues the IT reseller community faces, as a result, will … read more
If you’re in an industry that collects and processes payment card data and information, you’re no stranger to PCI DSS compliance, the standards in place to protect cardholder information. It makes sense, therefore, that if technology is always changing, so too must the rules and regulations surrounding PCI compliant hosting.
Most recently, the PCI Security … read more
Are you considering implementing a colocation strategy and partnering with a colocation provider to host your data? Perhaps your in-house data center doesn’t have the space you need to expand, or maybe you need far greater power density to support the addition of new equipment. Or you want to have a better disaster recovery plan … read more
Creating a disaster recovery (DR) plan is an essential part of your business continuity planning process. But, there’s more to it than just developing the plan. You must test your plan to ensure it will work in the case of an emergency—or risk failure when something goes wrong.
Even though there are costs associated with … read more
In an effort to be more productive and connected, employees are taking it upon themselves to seek technology solutions that fit their workplace needs, and as a result, are inadvertently creating serious challenges for their IT teams. The number of employees bringing personal mobile devices into the workplace and using them as business devices has … read more
Keeping financial data secure is becoming a top challenge for businesses of every kind and every size. If your business stores, processes, or transmits credit card information, you are required to maintain a secure IT environment—and to be compliant with PCI regulations.
Earlier this year the Payment Cards Industry (PCI) Security Standards Council mandated new … read more
Once you’ve made the business decision to store your organization’s hardware, software, and business-critical data in a colocation facility, you need to choose the right colocation provider. A number of important considerations will factor into your decision including the company’s reputation, location, security, and access to power.
One critical attribute your provider should demonstrate is … read more
Senior information technology professionals expect their departmental budgets and staffing to remain relatively flat in 2016, even as their companies predict average higher revenues. This year’s IT budgeting high-wire act will center on operating system migrations and better protection from security threats.
Those are among the key findings in “Spiceworks 2016 State of IT,” an … read more
Safeguarding protected health information is becoming more challenging every day—especially for companies operating in healthcare verticals who don’t always understand that compliance issues apply to them. Yet, under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, companies operating in a variety of healthcare verticals are categorized collectively as “Business Associates” (BAs) … read more
Cloud, Hybrid Hosting and Big Data Expert Joins OnRamp to Develop and Launch New Services Austin, TX – OnRamp, a leading high security and hybrid hosting provider with data center facilities in Texas and North Carolina, is pleased to announce that Toby Owen will join the company as Vice President of Product Development. Owen brings … read more
When it’s time to look for a colocation provider you may find that comparing data centers can be both confusing and complicated. There are a number of variables to consider to identify the best provider to meet your needs—and multiple factors that will impact your decision. This Ultimate Data Center Colocation Checklist will help you … read more
So you did your homework and partnered with a hosting provider that is both HIPAA compliant and has a great reputation for security—you’re all set, right? Actually, maybe not. Let’s back up.
As we mentioned in an April post entitled: Audits are Coming, are you Fine or Fined, business associates and their subcontractors are directly … read more
There are so many e-Commerce PCI Myths floating around that it’s easy to find the subject confusing. Here’s the reality: If your business accepts credit cards, your transactions must comply with the Payment Card Industry Data Security Standard (PCI DSS) – a set of standards that applies to any company that accepts, processes, stores or … read more
When Congress passed the Health Insurance Portability and Accountability Act of 1996 – known as HIPAA, but officially titled “Standards for Privacy of Individually Identifiable Health Information” – it intended the Act to cover overall healthcare reform. Twenty years later, technology has evolved more rapidly than the legislation covering it. Keeping up with compliance mandates, … read more
In Part One of our two-part series on the vital points of failure you need to address immediately for PCI DSS compliance, we introduced you to a few of the changes that versions 3.1 and 3.2 of the PCI DSS require. In Part Two, we’ll tell you about five additional points of failure that could … read more
Even if you don’t work in IT Security, it’s hard to be unaware of the increasing numbers of significant data breaches where hackers have stolen credit card information. We seem to read these headlines almost every other week, which leads us to highlight the vital points of failure you need to address immediately in this … read more