Our Thinking

Delta is Ready When You Are...But Are Their Systems?

Posted by Steve Levinson on Aug 11, 2016 10:49:33 AM

By now you have likely heard about, or worse yet, been impacted by the glitch that crippled Delta Airline’s network and reservations system on Monday that forced them to cancel about 1,000 flights worldwide. Delta has stated that a power control module malfunctioned, causing a surge that cut off power to their main computer network. Normally, the systems would switch to backup computer systems almost instantaneously, however in this case something didn’t go right. Confidentiality, Integrity, and Availability (CIA) are the foundational cornerstones of information security, and in this case, availability was on the wrong flight path. It is safe to say that this problem, which will ultimately cost the airline millions of dollars, could have been avoided through scenario planning.

Read More

Topics: Security

Where in the World is "The Cloud"?

Posted by William Mabley on Aug 10, 2016 1:57:48 PM

Introduction

Data is the lifeblood of most modern businesses. One of the key benefits we often mention about the  Cloud is that the data is not tied to hardware that could fail – your data is simultaneously everywhere and nowhere. Things become a bit more complicated if you are in a regulated industry that dictates controls and conditions around where your sensitive data is allowed to live. Data Sovereignty refers to the concept that data is subject to rules and regulations of the country where the data resides; it is an important consideration in your Cloud planning. 

Read More

Topics: Cloud Computing

What is the Cloud and why Should my Organization be Using it?

Posted by William Mabley on Jul 29, 2016 2:16:04 PM

Technology is always changing, but it is safe to say that few technological advancements have had as big an impact on organizations as the Cloud. So, what exactly is the Cloud and what services does it provide? Well, it is a little bit marketing and a lot technology.

Read More

Shanty or Fortress? How Application Development is Like Building a House

Posted by Steve Levinson on Jul 25, 2016 3:12:12 PM

If you’ve ever gone through the process of building a new home, or know someone who has, you know that it’s a major process. It’s something that you hope to live with (and in!) for a long time. And in the case of application development, you might even have possibly millions of visitors!

Read More

Topics: Security

"You've Got Mail!" - Now how do you move it?

Posted by William Mabley on Jul 22, 2016 4:59:49 PM

Today’s Microsoft Office 365 platform is one of the most sophisticated and comprehensive Cloud computing Software as a Service (SaaS) offerings in the world. It offers significant advantages and benefits to its users: low-cost, increased collaboration; security; and dependability. As Cloud adoption rates continue to rise (just ask Google), more and more companies are looking for ways to take advantage of the Cloud. 

Read More

Top 10 Considerations When Moving to the Cloud

Posted by William Mabley on Jul 20, 2016 10:16:08 AM

Businesses around the world are making the move to the Cloud in record numbers. If this is an accurate indicator, then it’s clear that the Cloud is here to stay.

Read More

Topics: Cloud Computing

Attention Service Providers – Penetration Testing on Segmentation is Now Required Every Six Months

Posted by Rob Harvey on Jul 13, 2016 2:47:38 PM

Any time the Payment Card Industry (PCI) Security Standards Council releases an update to its Data Security Standard (DSS), it raises a new set of questions and concerns. The latest update, PCI DSS v3.2, came out on 4/28/16. It primarily impacts service providers and is focused on the implementation of best practices into the Standard. (For a detailed breakdown of the changes, check out Steve Levinson’s blog on the release.) One of the biggest changes in this update is the requirement to have penetration testing on the segmentation (if used) at least twice a year – this will have a significant impact on service providers and is something you need to understand and prepare for. 

Read More

The (Security) Business Case for Moving to the Cloud

Posted by James Adamson on Jun 15, 2016 9:00:00 AM

Lower capital expenses, access to the newest technology, and operational efficiency are among some of the most documented benefits of moving to the Cloud. The conversation gets a bit complicated when somebody invariably asks: Is the Cloud secure? Can you trust a platform with limited security controls, new security paradigms, and unfamiliar management techniques?

Read More

Top 3 Factors for Delivering a Successful Service Management Project

Posted by David Wang on Jun 14, 2016 2:29:55 PM

Service Management projects can have great results when the solution is defined parallel to the process implementation plan. At Online, we believe there are many factors that can influence how successful a project will be. Here are the top three factors for implementing a successful Service Management solution.

Read More

Topics: Project Management, Service Management

The University of Calgary Under Siege

Posted by Todd Mackey on Jun 13, 2016 9:30:00 AM

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.” – Kevin Mitnick

Read More

Our Thinking - The Online Blog is a source for insights, resources, best practices, and other useful content from our multi-disciplinary team of Onliners.

Subscribe to Blog Updates