
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yDciH2d5SS\"><a href=\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\">Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/embed\/#?secret=yDciH2d5SS\" width=\"600\" height=\"338\" title=\"&#8220;Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance&#8221; &#8212; OTAVA\" data-secret=\"yDciH2d5SS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective. How can you make encryption easier to implement? Use high-end technology products Partner with a provider that understands encryption One example is Online Tech&#8217;s encrypted cloud solution that uses EMC VMAX storage (SAN). If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption. Another service we provide is\u00a0SSL certificates,\u00a0two-factor authentication\u00a0and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application. Watch the full video on our site. View other videos in the data encryption series\u00a0here, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the\u00a0Detroit SecureWorld Expo\u00a0(today!): Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm &#8211; 2:15pm Description:\u00a0Network Security is defined as, \u201cthe protection of a computer network...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"}