Online Tech’s Three-Part Encryption Webinar Series Begins Tuesday

Online Tech, the leader in secure and compliant data hosting, is focusing its ‘Tuesday at 2’ webinar series squarely on encryption, using experts from within and outside its staff to present on different aspects of the topic each of the next three weeks.

The series starts at 2 p.m. ET on Tuesday, June 11, when Chris Heuman of RISC Management and Consulting discusses encryption from a privacy, security and compliance perspective. A 20-year healthcare IT veteran, Heuman will show organizations how to meet the requirements of HIPAA, PCI and other regulatory frameworks.

Next, on June 18, are co-hosts Farooq Ahmed and Mark Stanislav discussing encryption at the software level. Ahmed, a software development manager at Online Tech, will discuss encryption for Windows while Stanislav, a ‘security evangelist’ at Duo Security, will focus on Linux.

Finally, Online Tech systems support manager Steve Aiello will discuss encryption at the hardware and storage level on June 25.

A closer look at the three webinars:

June 11: Encryption – Perspective on Privacy, Security and Compliance
Host: Chris Heuman of RISC Management and Consulting
Description: HIPAA, HITECH, the Omnibus Rule, PCI-DSS and many other regulations and frameworks speak to the importance or requirement of encryption. Adequate encryption of regulated and sensitive data can help your organization meet or exceed the privacy and information security regulatory requirements you face, if it is implemented correctly. 

June 18: Encryption at the Software Level: Linux and Windows
Hosts: Farooq Ahmed of Online Tech and Mark Stanislav of Duo Security.
Description: Farooq and Mark will discuss how encryption can be applied at various levels, from the software application code. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.

June 25: Encryption at the Hardware and Storage Level
Host: Steve Aiello of Online Tech.
Description: Steve will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. 

About Online Tech
Online Tech, Michigan’s largest managed data center is becoming the largest in the Midwest, expanding into at least four new markets. The “Fort Knox’’ for data is known for complete redundancy - “backups for everything” - from multiple back-up generators and backup systems to locations straddling two power grids and even two CEOs.

Online Tech leads in secure, compliant hosting services including cloud hosting, managed dedicated servers, Michigan colocation and disaster recovery. Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster. Backed by independent HIPAA, PCI, SSAE 16, and SOC 2, Online Tech delivers the security, privacy, and availability expected from world class data center operators. For more information, call (877)740-5028, email This email address is being protected from spambots. You need JavaScript enabled to view it. or visit www.onlinetech.com.

About RISC Management & Consulting
RISC Management & Consulting is the only organization delivering information security and risk identification, determination and management to Covered Entities and Business Associates from the perspective of both clinical and information systems security experts. Its team has extensive experience working with clients in healthcare, banking, and higher education in all of our core practice areas including Risk Analysis, Technical Vulnerability Assessment, Application Security Assessment (Fuzz testing, Black Box, and White Box testing), development of Policies and supporting Procedures and control mechanisms, Business Continuity, Disaster Recovery, Social Engineering, selection and implementation of encryption technologies, SIEM and SOC build-out, and other security and compliance initiatives. All RISC team members are licensed and credentialed experts in the field, and ensure that your priorities are our priorities.

About Duo Security
Duo Security is the easiest two-factor authentication service to deploy, administer, and use. Duo’s service can be set up in as little as 15 minutes, and used immediately by anyone with a phone. Over 1,000 organizations in over 80 countries rely upon Duo to prevent online account takeover and data theft. Backed by Google Ventures and True Ventures, Duo has been deployed by some of the most security-conscious organizations on the planet along with 3 of the top 5 social networks. Learn more and try it for free at duosecurity.com.

Press Contact: April Sage, Director or Marketing, Healthcare Vertical, Online Tech, 734.213.2020 x 113 or This email address is being protected from spambots. You need JavaScript enabled to view it.

Get started now. Exceptional service awaits.