To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization?

November 12, 2013

(Save to cal)

Attorney Tatiana Melnik and Senior Product Architect Steve Aiello discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace.
Title: To be BYOD or no ...


Read more Webinars    |    Online





Navigating PCI Security Mountains in the Cloud

November 06, 2013

(Save to cal)

Join a PCI DSS panel discussion with technical and administrative experts in the field as they discuss the role that cloud service providers play in protecting cardholder data and the security iss ...


Read more Webinars    |    Online





Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI

September 17, 2013

(Save to cal)

Brian Balow of Dickinson Wright and April Sage of Online Tech discuss the HIPAA Breach Notification Rule and the implementation of HHS encryption standards to protect PHI.  Title: Removing the ...


Read more Webinars    |    Online





How to Achieve Maximum ROI and Patient Satisfaction via EMR

July 30, 2013

(Save to cal)

Sandy Vosk and Steven Caruso of ImageDoc USA provide guidance on EMR implementation, intended to improve profitability and efficiency while reducing your risks before, during and after software ad ...


Read more Webinars    |    Online





Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption

July 23, 2013

(Save to cal)

Zoe Lindsey, Regional Director of Duo Security and April Sage, Director Healthcare Vertical of Online Tech, provide an informative webinar on how to secure access to confidential health informatio ...


Read more Webinars    |    Online





Why Is It So Hard to Secure a Company?

July 16, 2013

(Save to cal)

 Adam Goslin, COO High Bit Security provides an informative webinar on the latest information on cyber-theft, and the very real security challenges all businesses face. Title:Why Is It So Hard t ...


Read more Webinars    |    Online





Encryption at the Hardware and Storage Level

June 25, 2013

(Save to cal)

Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, provide an informative webinar on encryption at the hardware and storage level. Title ...


Read more Webinars    |    Online





Encryption at the Software Level: Linux and Windows

June 18, 2013

(Save to cal)

An informative/technical webinar on encryption at the software level in which Mark Stanislav, Security Evangelist at Duo Security discusses encryption for Linux, and Farooq Ahmed, Software Develop ...


Read more Webinars    |    Online





Encryption - Perspective on Privacy, Security, & Compliance

June 11, 2013

(Save to cal)

Chris Heuman, Practice Leader for RISC Management and Consulting, provides an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful ...


Read more Webinars    |    Online





The Affordable Way to Maintain Security and Compliance with Two-Factor Authentication

June 04, 2013

(Save to cal)

Richard Li and Brian Kelly of Duo Security and Jason Yaeger, Director of Operations/Risk Management & Security Officer of Online Tech discuss how to employ two-factor authentication to protect you ...


Read more Webinars    |    Online





Get started now. Exceptional service awaits.