Online Tech’s Three-Part Encryption Webinar Series Begins Tuesday

Experts from Online Tech, Duo Security and RISC Management to Present on Various Aspects of Encryption on June 11, June 18 and June 25 Ann Arbor, Michigan –Encryption is as old as communication itself, dating back to Egyptian stone carvings in 1900 BC. It’s probably about time to fully understand the concept of converting data so it cannot be understood by unauthorized people. Online Tech, the leader in secure and compliant data hosting, is focusing its ‘Tuesday at 2’ webinar series squarely on encryption, using experts from within and outside its staff to present on different aspects of the topic each of the next three weeks. The series starts at 2 p.m. ET on Tuesday, June 11, when Chris Heuman of RISC Management and Consulting discusses encryption from a privacy, security and compliance perspective. A 20-year healthcare IT veteran, Heuman will show organizations how to meet the requirements of HIPAA, PCI and other regulatory frameworks. Next, on June 18, are co-hosts Farooq Ahmed and Mark Stanislav discussing encryption at the software level. Ahmed, a software development manager at Online Tech, will discuss encryption for Windows while Stanislav, a ‘security evangelist’ at Duo Security, will focus on Linux. Finally, Online Tech systems support manager Steve Aiello will discuss encryption at the hardware and storage level on June 25. A closer look at the three webinars: June 11: Encryption – Perspective on Privacy, Security and Compliance Host: Chris Heuman of RISC Management and Consulting Description: HIPAA, HITECH, the Omnibus Rule, PCI-DSS and many other regulations and frameworks speak to the importance or requirement of encryption. Adequate encryption of regulated and sensitive data can help your organization meet or exceed the privacy and information security regulatory requirements you face, if it is implemented correctly. (For more information and to register, click here.) June 18: Encryption at the Software Level: Linux and Windows Hosts: Farooq Ahmed of Online Tech and Mark Stanislav of Duo Security. Description: Farooq and Mark will discuss how encryption can be applied at various levels, from the software application code. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. (For more information and to register, click here.) June 25: Encryption at the Hardware and Storage Level Host: Steve Aiello of Online Tech. Description: Steve will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. (For more information and to register, click here.) About Online Tech Online Tech, Michigan’s largest managed data center is becoming the largest in the Midwest, expanding into at least four new markets. The “Fort Knox’’ for data is known for complete redundancy - “backups for everything” - from multiple back-up generators and backup systems to locations straddling two power grids and even two CEOs. Online Tech leads in secure, compliant hosting services including cloud hosting, managed dedicated servers, Michigan colocation and disaster recovery. Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster. Backed by independent HIPAA, PCI, SSAE 16, and SOC 2, Online Tech delivers the security, privacy, and availability expected from world class data center operators. For more information, call (877)740-5028, email [email protected] or visit www.onlinetech.com. About RISC Management & Consulting RISC Management & Consulting is the only organization delivering information security and risk identification, determination and management to Covered Entities and Business Associates from the perspective of both clinical and information systems security experts. Its team has extensive experience working with clients in healthcare, banking, and higher education in all of our core practice areas including Risk Analysis, Technical Vulnerability Assessment, Application Security Assessment (Fuzz testing, Black Box, and White Box testing), development of Policies and supporting Procedures and control mechanisms, Business Continuity, Disaster Recovery, Social Engineering, selection and implementation of encryption technologies, SIEM and SOC build-out, and other security and compliance initiatives. All RISC team members are licensed and credentialed experts in the field, and ensure that your priorities are our priorities. About Duo Security Duo Security is the easiest two-factor authentication service to deploy, administer, and use. Duo’s service can be set up in as little as 15 minutes, and used immediately by anyone with a phone. Over 1,000 organizations in over 80 countries rely upon Duo to prevent online account takeover and data theft. Backed by Google Ventures and True Ventures, Duo has been deployed by some of the most security-conscious organizations on the planet along with 3 of the top 5 social networks. Learn more and try it for free at duosecurity.com. Press Contact: April Sage, Director or Marketing, Healthcare Vertical, Online Tech, 734.213.2020 x 113 or [email protected]

Suggested Articles

An assessment looking at 12 health systems that allow patients to download their health records to their smartphones via APIs finds modest uptake.

The National Institutes of Health-led All of Us precision medicine project has enrolled 230,000 participants with another 40,000 people registered.

Hospitals must pursue a deliberate strategy for managing their public image—and a powerful tool for doing so is inpatient clinical data registries.