HIPAA Compliant Database Hosting

Top 10 Considerations for a HIPAA-Compliant Database

If you’ve been charged with implementing a HIPAA-compliant database and it’s your first time building a system that adheres to the healthcare law, you may feel overwhelmed and confused about where to start. The first step is to focus your efforts so you can move forward systematically in creating one. The below considerations will allow you to establish a database and protect it over time.

Read More

Two-Factor Authentication vs. Multi-factor Authentication – The Best Log-In Security

When securing access to sensitive IT infrastructure, professionals must consider what security authentication method is going to be implemented to protect the data and content stored within. With the prominent and growing concerns of cybercrime and internet security in the computing industry, a simple single-factor authentication process with a standard user name and password to access online accounts, computers, servers or even banking services is insufficient.

Read More

IoT Security Risks, GDPR and Healthcare Data

Many technology professionals are excited by the significant benefits and enhancements the Internet of Things (IoT) can bring to the healthcare sector. The future of IoT healthcare data and the enhancements that can be offered to the patient’s care are intriguing, unfortunately, there are many obstacles that must be overcome to make it a viable technology for the healthcare profession.

Read More

Can MongoDB Be HIPAA-Compliant?

When you consider a HIPAA compliant database for storing protected health information (PHI), you may wonder if a NoSQL solution such as MongoDB is a strong choice. If using MongoDB, you can take steps to make sure your database stays compliant with the Health Insurance Portability and Accountability Act (HIPAA) – both in choosing the right flavor of MongoDB and understanding its security features.

Read More

HIPAA Data Breach Answers from an Expert

Q&A With Gillware Forensics Investigator Nathan Little

Will Ascenzo is a blogger, copywriter, and technical writer for Gillware Data Recovery and Gillware Digital Forensics.

With how prevalent data breaches are in the news cycle now, data breaches seem to be every big business’ bête noire. Most at risk of data breaches and cyber attacks are organizations in the financial industry and healthcare industry. Due to the sensitivity of the healthcare data and HIPAA regulations regarding the unauthorized access to and disclosure of protected healthcare information, the threat of data breaches presents a particular problem to HIPAA-covered entities and business associates of all shapes and sizes.

Read More

Top 5 Biggest Data Breaches, and What Hosting Companies Learned

Data: our whole world runs on it in some form or fashion.

It defines our business decisions, it lets us buy anything we want, delivered the next day, and it even tells our sports teams who should bat next in the lineup.

The power of data is immense. And when that power falls into the wrong hands, it generates such enormous problems that it can take years to sort them out.

Read More

Cloud Database Hosting for Small Business: Why It’s Ideal

If you’re talking about innovation and competition in the modern economy, you will inevitably wind up talking about the subject of data. It’s no secret that we rely on data for everything whether it be strategy or tactics. This, of course, leads us to the topic of “big data” which for the past decade has been touted as the difference maker in a business’ ability to gain a better understanding of the complex factors, including customer behaviors, that are contributing to a business’ success or even failure.

Of course, simply collecting the data isn’t the whole story. There are infrastructure concerns that need to be met when implementing large databases. You need somewhere to keep your database. Not only that, but the hardware needs to be up to the task of handling the processing power required to run the database and allow it to be accessible. Many small businesses are turning to Cloud Hosting as the solution that fits their needs best.

Read More

Elasticsearch Distributed NoSQL Database – What Is It and Should You Use It?

Are you trying to decide whether or not Elasticsearch might be right for your company? Here is a look at its benefits.

  • What is Elasticsearch?
  • Features
  • One Programmer’s Perspective
  • Strong Elasticsearch Hosting

What is Elasticsearch?

Elasticsearch is a full-text, distributed NoSQL database. In other words, it uses documents rather than schema or tables. It’s a free, open source tool that allows for real-time searching and analyzing of your data. People appreciate this system because it allows you to run metrics on your data immediately, so you can understand it right away, on an ongoing basis.

Read More

How to Configure LVM (Logical Volume Management) on DRBD (Distributed Replicated Block Device)

Verified and Tested 1/20/16


This how-to will help walk you through adding LVM to DRBD. Distributed Replicated Block Device (DRBD) is a block level replication between two or more nodes and is used as a replacement for shared storage by created a networked mirror. DRBD is used in environments that require systems or data to be Highly Available.


* Two servers running Debian GNU/Linux Distribution. Other versions of Linux will work as well, but the installation packages may be different. If you need a server, you can spin up a fast and reliable cloud hosting server from Atlantic.net in under 30 seconds.
* Both servers should be directly cross-connected together, or have a separate Network Interface for private communication.
* Both servers should have the same partitioning. This walkthrough assumes that both systems have a single /dev/sdb device that is going to be used as the
DRBD volume.

Read More

What is: Backups – a Review of Basic Concepts

Target Audience

This article is aimed at a non-technical audience looking for an introduction to or review of data backup options.


It’s a fact of life that computer files can be lost through human error or hardware crashes. A data backup is a process that duplicates a computer’s data files, creating copies that can be used if the originals are lost or damaged. Regular backups have been a necessary and standard part of professional computer operations for many years.

Devices and Media

A backup process copies files, placing the duplicates on a separate storage device. The type of device you use can depend on cost, convenience, and the amount of data involved.

  • Tape Cartridge — A palm-sized mechanism containing a spool of magnetic tape
    • Benefits: Relatively low media cost, portable, easy to store, fast backup speed, high capacity, reusable
    • Drawbacks: Expensive drive cost, tape is less common than other media
  • Hard Drive — A standard computer hard disk drive, internal or external
    • Benefits: Speedy backups, low cost per byte, high capacity, unlimited reuse of media
    • Drawbacks: less portable than other media.
  • Optical Disc — Blank CD, DVD, or Blu-ray media
    • Benefits: Low-cost drive and media, widely available, compact, easy to store, portable
    • Drawbacks: Limited or no reuse of media, backups can be slow
  • Flash Drive — Solid-state data storage, such as a USB stick or solid-state drive (SSD)
    • Benefits: Fast backups, portable, rugged, reusable media, no moving parts to wear out
    • Drawbacks: Relatively high cost per byte compared to other media, although flash memory price has declined with advances in technology


Types of Backups

Full Backups

As the name suggests, a full backup copies virtually every file on a computer. Although essential, full backups can be time-consuming and use large amounts of data storage space. It’s common to do a full backup once a month or once a week, with partial backups filling out the rest of the schedule.

Partial Backups

A partial backup stores only a selection of files, so it is typically faster than a full backup and uses less space on the backup media.

Differential Backups

A differential backup is a partial backup that copies only files changed since the last full backup. For example, a computer has 1,000 files. On the day after the full backup, 30 files have data changes, so a differential backup copies only those 30 files. The next day, 5 other files have changed. The subsequent differential backup copies 35 files — the ones from the first day plus those that changed on the second. With each passing day, more files might change, so backups can take longer and consume more data storage space.

Incremental Backups

An incremental backup is another type of partial backup that copies files that have changed since the last backup of any sort, full or partial. Following the previous example, an incremental backup copies 30 files on the first day but only 5 on the second. Because it looks only for files that changed that day, an incremental backup typically takes less time and storage space than a differential backup. On the other hand, differential backups are easier to manage when you need to recover files after a hardware failure; the full backup and the most recent differential backup have all the files necessary, whereas every daily incremental backup is needed to rebuild your files.

Piecemeal Backups

You can back up individual documents manually to an external drive, such as a USB flash drive. Although this is a simple backup option, it does rely on your ability to remember to perform the backup and increases the opportunity for human error to negatively affect your data.

Handling Backup Data

Encrypted Backups

With most backup software you can choose to encrypt files, making the copies unreadable without the correct password. This feature can be important for backing up proprietary and confidential information, helping to keep it safe from hackers and identity thieves.

Compressed Backups

Your computer may have large files or large groups of files. The more data you have to back up, the more you’ll spend on media. A technique called compression makes data more compact, squeezing the same information into fewer bytes of data and helping to save backup storage space and reign in media costs. Compression gives best results on general documents such as PDFs and spreadsheets; some types of files, such as JPEGs and MP3 sound recordings, are already compressed, making backup compression less effective on them.


Another technique, called deduplication, is similar to compression in that it reduces the storage space needed for backups. The process looks for duplicate information in your original files and skips it during backups, storing a small piece of data instead that marks the location of the duplicate information. For example, a shared drive has folders belonging to hundreds of users, each of which has a copy of the company phone directory. Deduplication stores one copy of the directory and records the duplicate locations but does not store the duplicate files. When restoring files, the deduplication software recreates the data, duplicates included. Deduplication can be very effective at reducing backup media requirements.

Database Backups

A database management system (DBMS) might require its own backup process in addition to the regular file backups on your computer; this is true in particular for commercial DBMSs such as Oracle and Microsoft SQL Server. An improper database backup can leave you without critical business records after a hard disk failure. Check with the database software’s documentation on backups for special requirements.

Offsite Storage

An offsite backup involves storing backup media at a different geographical location from the originals. You can, for example, keep a flash drive containing critical file backups in a safe deposit box or other secure facility. Offsite backups preserve valuable information in case of flood, fire, or other calamity.

Internet Backup Services

The growth of high-speed Internet access in recent years has made online backups possible. Services such as Carbonite, OpenDrive, and Barracuda offer automatic backups over the Internet. However, for home and small-office use, bandwidth and data caps may affect how practical this sort of service is. Even a single PC can hold terabytes of data, and a full backup that size could potentially take months. On the other hand, medium to large companies typically have much faster Internet service, making large online backups more realistic. Another important issue common to Internet backup services is that they cap the amount of data you can send them on a given day regardless of your Internet speed.

Restoring Files

A restore operation works like a backup but in reverse; it copies files from the backup media to your main computer hard drive. A catastrophic failure may require a full restore of data, which can be an ordeal as you copy all of your data from your backup to your computer. To take another example, if delete a file accidentally, you might restore only that file.


Backups serve as a critical “safety net” for your data, protecting it from crises ranging from fire and flood to computer viruses and hardware crashes. Backup hardware and software packages are available to suit any size business, whether you need a simple program for a one-person shop or a sophisticated solution for a global enterprise.



We offer industry leading cloud servers with redundant backup to make sure that our HIPAA compliant database hosting is secure, reliable and always available.

New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4


London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom


We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.