Atlantic.Net Blog

Cloud Hosting: Igniting Small Business Potential

  • Same Technology for David and Goliath
  • How Cloud is Reimagining Small Business
  • Take Action

Same Technology for David and Goliath

Enhanced access is a fundamental property of the cloud. What that means is not just that more users can access the environments supported by the virtual servers but that the playing field is leveled due to the lower price. In other words, cloud is underdog-ready. Small business now can take advantage of the same big data platforms and real-time analytic tools as enterprises.

Read More

The Role of Business Associates in HIPAA Compliant Hosting

  • HITECH and the Role of Business Associates
  • Business Associate Definition
  • Examples and Wide-Ranging Scope

HITECH and the Role of Business Associates

A HIPAA compliant system must be designed conscientiously to include the various security and privacy technologies discussed in the above video.

Read More

Compassion and Humanity: Ubuntu LTS for Linux SSD Cloud

Developed and managed in conjunction by the open source community and Canonical, Ubuntu is one of the most popular distributions of the Linux operating system. The name itself is a nod to the synergistic, “share and share alike” philosophy that is considered a pillar of the open source movement. Ubuntu is a word used in Xhosa and Zulu that is roughly translated as humanity, compassion, or the whole is better than the sum of its parts.

Read More

Imagining the Internet of Things

How much do we want data to flow? It’s a more confusing question than you might think. The third platform of computing (the realm of the cloud) has made it possible for us to integrate systems and process data from multiple devices seamlessly in real-time. In many ways, that scenario is wholly positive. In others, it’s cause for concern.

Read More

Cloud VPS vs. Traditional VPS vs. Private Cloud

VPS Changing with the Cloud

A critical concern when exploring hosting solutions is deciding whether you want to go with the innovative, newer option or to stick with the traditional model. Cloud has grown astronomically in recent years. Perhaps 2014 was the year that cloud graduated from test projects and startups to enterprise acceptance, with General Electric announcing that it was already running 90% of new applications through the public cloud.

Read More

How to Become HIPAA-Compliant

Understanding and implementing systems and operations that are compliant with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) can quickly become overwhelming. It should help to run through a 10-step HIPAA compliance checklist. We can also look at a spotlight of hosting questions asked by a healthcare client.

  • 10-Step HIPAA Checklist
  • Spotlight: HIPAA Technology Provider Questions
  • The Right HIPAA Information Technology Answers

10-Step HIPAA Checklist

If you want to know how to become HIPAA compliant, there are specific standardized technologies that you should have in place to properly protect PHI and avoid violations. The technological side will be discussed in the spotlight section below.

Read More

What is the HIPAA Security Rule? [Safeguard Checklist]

The HIPAA Security Rule is a piece of the Healthcare insurance Portability and Accountability Act, passed by Congress and signed into law in 1996. Here is a little information on the Security Rule and a security checklist so that your organization can quickly and effectively become compliant.

  • HIPAA Security and Privacy Rules
  • HIPAA Security Checklist
  • Get Help

HIPAA Security and Privacy Rules

In 1996, a few pen strokes made a huge impact on the American healthcare industry: President Bill Clinton signed the Healthcare insurance Portability and Accountability Act into law. Title II of HIPAA directed Health and Human Services (HHS) to create a series of guidelines and standards to safeguard patient health data. In turn, HHS developed regulations which are typically called the HIPAA Privacy Rule and HIPAA Security Rule.

Read More

What is HIPAA Compliance?

HIPAA compliance is an attribute of an organization or system that follows the parameters of the Health Insurance Portability and Accountability Act, legislation that specifies the protection of patient files through its security and privacy rules.

  • Not Just Data Privacy: The 5 HIPAA Titles
  • HIPAA Title II Highlights
  • What Can Go Wrong? [Stats]
  • HIPAA Compliant Hosting Requirements

Not Just Data Privacy: The 5 HIPAA Titles

HIPAA compliance is adherence to the laws outlined in the Health Insurance Portability and Accountability Act, US federal healthcare legislation that notably contains rules for security and privacy of patient records. The act, which became law in August 1996 under President Bill Clinton, has five sections – called titles – focused on specific areas:

Read More

Stay Connected With Us