Atlantic.Net Blog

HIPAA vs. HIPPA

Kent Roberts December 13, 2017 by under HIPAA Compliant Hosting 0 Comments

HIPPA compliance? No, HIPAA compliance.

HIPAA is the Health Insurance Portability and Accountability Act of 1996. HIPPA is simply a typo. Probably in part because English would typically put two Ps together in the middle of a word (think oppose or appear), HIPAA is often wrongly spelled as HIPPA. It really is extremely difficult to remember how to spell HIPAA, and it is certainly easy to write the acronym incorrectly if you are moving quickly. This article explores topics related to the misspelled form HIPPA, partially as entertainment. It concludes with a brief outline of HIPAA and the Security Rule, more serious considerations.

Read More


What is ISO 27001 Compliance as it Relates to Cloud or Dedicated Hosting?

Kent Roberts December 11, 2017 by under HIPAA Compliant Hosting 0 Comments

The year was 1946. Experts from 25 nations convened in London to talk about the breathtakingly pragmatic topic of international standardization. Professionals from myriad fields were getting together to figure out how a common language of quality control, related to how products were manufactured and services provided, could be spoken across continents with ease.

Many people yawn when the topic of compliance is introduced (due to its often dense technicality, its obsessive exactitude related to clarity of specifications, its perception as a snooze-worthy topic, its connection to federal regulations, etc.). Because many view compliance with boredom or indifference, it may be seen as unimportant, but we’re going to take a moment to appreciate how helpful compliance is.

Read More


How to make your WordPress site HIPAA-Compliant

To deliver HIPAA compliance within WordPress, the first step is to understand the basics of HIPAA-compliant IT and hosting. Relative to the specific deployment, perform a risk analysis and then build a HIPAA-compliant website in WordPress with five basic concerns in mind.

HIPAA compliance in IT – the basics

Why is this form of compliance needed? Organizations in healthcare and their service providers want to avoid federal fines but also want to generally prevent compromise. Healthcare data breaches increased 40% from 2015 to 2016, so now it is even more critical to pay attention to defenses for your protected health information (PHI) – particularly the electronic protected health information (ePHI) safeguarded within data environments.

Read More


Was Your E-Commerce Hosting ready for the Black Friday Rush?

Adnan Raja December 8, 2017 by under PCI Hosting 0 Comments

In 2016, for the first time in history, Americans spent more money online on Black Friday than they did in retail, avoiding the trampling crowds searching packed department stores for the best deals in retail.

A full 108.5 million customers did their shopping online, according to a survey by the National Retail Federation: nearly 10 million more than the 99.1 million that braved the weather and crowds to do their shopping in person.

Read More


Why Choose Atlantic.Net Over the Big Guys

Jennifer Rey November 30, 2017 by under Cloud Hosting 0 Comments

Our knowledge and available time drive our choices. For example, suppose you have a leaky faucet. Should you call a handyman or fix it yourself? If you feel comfortable with plumbing, know how things work inside a faucet, and have the time, you’ll probably go to your nearest big box hardware store, buy a few parts, and fix the faucet yourself. On the other hand, if you don’t know anything about faucets, or if you don’t have time to do the repair yourself, you’ll probably call a handyman. Your knowledge about how faucets work and how much time you have drive your decision about how to fix your leaky faucet.

When it comes to cloud server hosting, these factors also apply. If you know a lot about cloud hosting or have people who can manage things for you, selecting a do-it-yourself cloud hosting provider like Amazon AWS, Microsoft Azure, or Google Compute Engine might be a good option for you. However, if you don’t know a lot about cloud server hosting or don’t have the time or people to take care of it, you’ll probably look for a cloud hosting provider who can set you up with the right solution and then make sure it stays up and running.

Read More


How to Prevent a Cyber Attack

Adnan Raja November 29, 2017 by under Managed Server Hosting 0 Comments

One of my favorite movies of the 1980s is “Wargames,” in which a teenage hacker, played by Matthew Broderick, accidentally activates a nuclear defense computer program named ‘Joshua.’ The program contemplates launching the US’ arsenal of nuclear weapons in a preemptive strike against the Soviet Union. With the computer seizing the missile codes, the military officers at NORAD attempt to simply turn the system off to prevent the incursion. When they reboot, Joshua starts right back up again.

Cyber attacks today are just like Joshua – you can’t simply turn off the system and make the threat disappear. You can implement preventative measures into your business’s infrastructure to vastly lower the chance of a cyber attack against your business. Let’s take a deeper dive into those practices after exploring the modern world of the cyber attack.

Read More


Improve HIPAA Compliance with Secure Messaging

Adnan Raja November 7, 2017 by under HIPAA Compliant Hosting 0 Comments

When Congress enacted the Final Omnibus Rule in 2013, many healthcare organizations, doctors and administrators became concerned about how they and their entities would maintain HIPAA compliance. As these individuals soon found out, HIPAA compliance was difficult to implement and maintain. The biggest challenges administrators faced was understanding what HIPAA-compliance meant and realizing what they needed to change in their day-to-day workflow in general and communications, in particular.

The goal of this blog is to bring some clarity to the issues that have arisen around HIPAA compliance for healthcare institutions as well as to highlight how the adoption of secure messaging solutions can improve compliance.

Read More


How to Reduce Your PCI Scope When Accepting Payments

Adnan Raja October 28, 2017 by under PCI Hosting 0 Comments

Accepting credit card payments can greatly boost your business’s bottom line, but it comes with an immense responsibility. Anyone paying attention to the news knows how ubiquitous credit card breaches and hacks have become, with Target, Home Depot, and now even Equifax — a premier U.S. credit bureau — falling victim to data breaches that compromise precious cardholder and personal data.

Read More


Comparison: Amazon AWS vs. Atlantic.Net

Derek Wiedenhoeft October 28, 2017 by under Cloud Hosting 0 Comments

 

Who you choose to be your Cloud provider is a critical decision that can affect the success of your business. Atlantic.Net offers great, affordable Cloud Hosting solutions for businesses of any size. We’re certain that after you see how we compare with Amazon AWS and the benefits we bring, like customized setup, hybrid solutions, and all-star support, that the decision will be clear.

 

Read More


Encryption in the Atlantic.Net Cloud Platform

Derek Wiedenhoeft October 25, 2017 by under Cloud Hosting 0 Comments

The Atlantic.Net Cloud Platform encrypts customer data stored at rest by default with no additional action required by the customer. This is accomplished through industry standardized encryption mechanisms.

Atlantic.Net believes encryption of customer’s data at rest shouldn’t be an optional feature and is now a requirement of all computing. That’s why our world-class encryption is implemented in a transparent manner, with no further need for configuration by the user.

Key Features
  • Data is automatically encrypted prior to being written to the disk.
  • Data is encrypted using Advanced Encryption Standard 256-bit (AES-256). This encryption standard is the only publicly accessible encryption cipher approved by the National Security Agency (NSA) for top secret information.
  • Each encryption key used to encrypt data is itself encrypted with a set of master keys.

Note: Encryption of data stored at rest is an important part of a broader data security strategy and
should not be considered the only mechanism for securing data.

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.