Atlantic.Net Blog

ECC Memory vs. Non-ECC Memory – Why It’s Critical for Financial and Medical Businesses

By: Kris Fieler

As businesses depend more on big data, the need to prevent data loss has never been more important. One of the most vital areas for this loss prevention is where data is temporarily stored, RAM.  ECC, or Error-Correcting Code, protects your system from potential crashes and inadvertent changes in data by automatically correcting data errors.  This is achieved with the addition of a ninth computer chip on the RAM board, which acts as an error check and correction for the other eight chips. While marginally more expensive than non-ECC RAM, the added protection it provides is critical as applications become more dependent on large amounts of data.

ecc-vs-nonecc

Likelihood of a Memory Error

On any server with financial information or critical personal information, especially medical, any data loss or transcription error is unacceptable.  Memory errors can cause security vulnerabilities, crashes, transcription errors, lost transactions, and corrupted or lost data.

Read More


Healthcare Hosting Checklist 2019: What is HIPAA Compliant Healthcare Hosting?

What should you look for in a good healthcare hosting provider? Healthcare hosting providers must comply with HIPAA, the Health Insurance Portability and Accountability Act of 1996, which means they must protect and secure patient records. When you look at healthcare hosting providers, you want to know how HIPAA audit-ready the healthcare host is.

Read More


How To Choose A Domain Name That Builds Trust

Guest Author: Rodney Brazil

While businesses use many online channels to engage customers, the company website is the most important of all. It serves as the home base for all online resources created by a brand. While business directories, social media, and interactive maps get a lot of attention these days, these important traffic sources all lead back to one place: your website.

While there are many factors to consider when structuring and maintaining a business website, one decision must be made early: the domain name.

Read More


The Importance of Disaster Recovery In the Midst of a Natural Disaster

Kent Roberts January 15, 2019 by under HIPAA Disaster Recovery 0 Comments

You may see natural disasters on TV or read about them but not completely understand the vulnerability associated with this issue. Actually, the risk is almost throughout the industry.

More than half of organizations (58%) are not ready for a major loss of data. Actually, the extent to which firms are unprepared is very worrisome: 60% will go bankrupt within 6 months, according to data from Washington, DC-based research firm Clutch. Also according to the statistics compiled by Clutch, cloud backup is on the rise, with:

  • 84% of the organizations that have already adopted cloud backup having implemented both on-premises and cloud backups;
  • 68% of cloud backup business customers testing their backups at least once per month; and
  • 78% of small businesses planning to use cloud-hosted backup by 2020.

To set aside the specific technology of cloud backup, the need for disaster recovery is clear from the data on the business impact of large data losses. Since it is possible to have a disaster completely take you by surprise, and to in turn lose thousands or millions operationally and economically, it is a basic business need to have a disaster recovery plan implemented.

Read More


How to Become HIPAA-Compliant: Our 10-Step Guide

Adnan Raja January 8, 2019 by under HIPAA Compliant Hosting 0 Comments

One of the problems with our increasingly technological world is that the speed at which our devices and services upgrade and make older versions obsolete can be dizzying. It feels like only an instant before the latest smartphone or flatscreen TV is being replaced with the bigger, better, faster model.

The same holds true in the world of hosting, data information, and server management. And while it can be tough to keep up for any type of business, it’s crucially important if your company is involved with health care IT and has to maintain HIPAA Compliance.

Read More


HIPAA Compliance Guide – How to Comply with HIPAA

Overwhelmed with HIPAA compliance? You’re not alone. Compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is important to the covered entities and business associates that are expected by the federal government to follow the law.

However, the requirements of HIPAA and its regulatory agency, the US Department of Health and Human Services (HHS), are not as rigid as they first may seem. We’ve detailed the broad concepts required to understand HIPAA or HIPAA compliant hosting in this article, which serves as a beginner’s HIPAA Compliance Guide.

Why HIPAA?

The healthcare privacy and security law was written to encompass the broad array of organizations for which it was intended. For that reason, the HHS website notes that “there is no single standardized program that could appropriately train employees of all entities.”[i]

Nonetheless, training is a requirement of HIPAA, so it’s necessary to find a strong beginner’s guide that can be used to train your employees on the essentials of compliance. Most of what is available online through the federal government is either aggregations of disparate pieces of information or sizable PDFs, such as the Guide to Privacy and Security of Electronic Health Information[ii] – created by the Office of the National Coordinator for Health Information Technology (ONC). The former is a bit disorganized. While the latter can be great as course material, its 60+ pages are overkill for the purpose of an initial overview.

Read More


Managed Hosting Solutions for Global Membership Organizations

Global membership associations must find ways to strategically operate their infrastructure and provide services. Often, such strategic operation involves managed hosting. Managed hosting can be understood in contrast to unmanaged hosting. It can also be understood as one of the various services provided through a host’s role as a managed services provider (MSP). By looking at other core services provided by MSPs, we also get a sense of the services that are often included in managed hosting environments.

Read More



Windows Server 2019 Datacenter Now Available!

Adnan Raja December 21, 2018 by under Announcements 0 Comments

We are pleased to announce the release of Windows Server 2019 Datacenter Cloud Server operating system for use in our Public Cloud.

Although this is a major release for Windows Server, Microsoft has kept the user interface and administration largely the same as Windows Server

2016 Datacenter. This will allow users to dive right into using Windows Server 2019 without a learning curve.

New features in Windows Server 2019

Some of the new features that have been introduced in Windows Server 2019 include:

System Insights:

This new feature provides insights into the functioning of your server and helps predict issues that may occur. This feature is designed to help cut down on reactive maintenance costs.

Windows Defender Advanced Threat Protection (ATP):

ATP exposes memory and kernel level attacks and responds by suppressing malicious files and terminating malicious processes to help keep your system protected.

Storage Migration Service:

Storage Migration Service makes it easier to migrate servers to a newer version of Windows Server. It provides a graphical tool that inventories, transfers, and configures data from old servers on to newer servers. It can optionally move the identities/users of the old servers to the new servers, so that the applications and users don’t have to change anything.

Heterogenous Containers:

This feature makes it possible to run Windows and Linux-based containers on the same Windows Server host using the same docker daemon.

Windows Time Service:

Windows Time Service provides provide more precise and frequent time syncing than the previous versions of Windows Server.

Login to provision 2019 Windows server in less than 30 seconds!


Top 10 Considerations for HIPAA-Compliant File Transfer

While HIPAA law is broad, at its core is the Security Rule, the full name for which is the Security Standards for the Protection of Electronic Protected Health Information. The Security Rule applies the rights that are conveyed by the Privacy Rule – i.e., the Standards for Privacy of Individually Identifiable Health Information – within digital environments. In order to achieve this aim, the Security Rule requires administrative, physical, and technical safeguards. These three categories of defenses are critical to ensuring HIPAA-compliant file transfer. Specific elements of these types of Security Rule protections include these ten key healthcare file transfer considerations:

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.