Author: Adnan Raja

HIPAA Security Rule Checklist: What is the HIPAA Security Rule?

Adnan Raja November 6, 2019 by under HIPAA Compliant Hosting 0 Comments

The HIPAA Security Rule is a piece of the Healthcare insurance Portability and Accountability Act, passed by Congress and signed into law in 1996. Here is a little information on the Security Rule and a HIPAA Security Rule Checklist so that your organization can quickly and effectively become compliant.

HIPAA Security and Privacy Rules

In 1996, a few pen strokes (and a lot of political wrangling leading up to those pen strokes) made a huge impact on the American healthcare industry: President Bill Clinton signed the Healthcare insurance Portability and Accountability Act into law.

Read More


For the second time, Atlantic.Net achieved recognition in Gartner’s 2019 Market Guide for Cloud Service Providers to Healthcare Delivery Organizations.

Adnan Raja October 23, 2019 by under Announcements 0 Comments

We owe our prestigious placement to the quality of our secure and compliant cloud solutions, which allow our healthcare clients to focus on their missions while Atlantic.Net handles the difficult technical implementations that make their business operations possible!

Read More


HIPAA Compliance Guide & Checklist: What Is HIPAA?

Adnan Raja September 15, 2019 by under HIPAA Compliant Hosting 0 Comments

Overwhelmed with HIPAA compliance? You’re not alone. Compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is important to the covered entities and business associates that are expected by the federal government to follow the law and be HIPAA compliant.

However, the requirements of HIPAA and its regulatory agency, the US Department of Health and Human Services (HHS), are not as rigid as they first may seem. We’ve detailed the broad concepts required to understand HIPAA or HIPAA compliant hosting in this article, which serves as a beginner’s HIPAA Compliance Guide; further below, you will find our HIPAA Compliance Checklist.

Read More


How Should You Prepare for the Next Wave of Ransomware, Malware, Network and File Vulnerabilities?

Adnan Raja August 8, 2019 by under Cloud Hosting 0 Comments

Cybersecurity is a hot topic in the IT industry, as IT sector is one of the industries most frequently targeted by malware and ransomware hackers. IT businesses store and handle an abundance of sensitive and valuable data belonging to third parties, government, healthcare and legal entities to name a few, making them a prime target.

Read More


Announcing IPv6 Support in USA-CENTRAL-1 (Dallas, TX)

Adnan Raja July 18, 2019 by under Announcements 0 Comments

 

IPv6 Dallas TX

 

We are excited to announce that our USA-CENTRAL-1 (Dallas, TX) Public Cloud location now has support for IPv6. This comes on the heels of our previous announcement of IPv6 support in our USA-EAST-3 (Ashburn, VA) Public Cloud location. Additional locations will gain support for IPv6 in the coming months. 16 IPv6 addresses are offered at no charge with each new or existing Cloud Server.

Read More


What Are the HIPAA Disaster Recovery and Business Continuity Requirements?

To comply with HIPAA, healthcare companies and their business associates must formulate a robust contingency plan in case of an event that disrupts operations. These plans have smaller component plans such as a Disaster Recovery Plan (DRP) and an Emergency Operations Mode Plan. This business continuity strategy requires healthcare organizations to be capable of recovering critical IT systems that handle Electronic Patient Health Information (ePHI) into a disaster recovery location while ensuring critical business functions continue in the event of a crisis.

Read More




Limiting Unauthorized Access to Your Data by Instituting an Authentication Service

With the surge in popularity of digitizing all forms of data, which are often stored within a public or private cloud hosting provider, there has never been a more urgent requirement to ensure that data integrity and data privacy is upheld. In this blog we will discuss the privacy, security and vulnerability of data and offer suggestions of how you can protect your critical workloads.

Read More


Healthcare Cybersecurity in 2019: Lessons We’ve Learned

The healthcare industry has been a primary target of data hackers for several years. There are numerous reasons for this. First, the healthcare industry offers a lot of valuable information to successful hackers – social security numbers, names, addresses, Medicaid ID numbers, medical records, health insurance information, and more – can all be scraped from a successful breach. It’s a literal goldmine for hackers.

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.