HIPAA Compliant Database Hosting

Top 10 Considerations for a HIPAA-Compliant Database

If you’ve been charged with implementing a HIPAA-compliant database and it’s your first time building a system that adheres to the healthcare law, you may feel overwhelmed and confused about where to start. The first step is to focus your efforts so you can move forward systematically in creating one. The below considerations will allow you to establish a database and protect it over time.

Read More


Two-Factor Authentication vs. Multi-factor Authentication – The Best Log-In Security

When securing access to sensitive IT infrastructure, professionals must consider what security authentication method is going to be implemented to protect the data and content stored within. With the prominent and growing concerns of cybercrime and internet security in the computing industry, a simple single-factor authentication process with a standard user name and password to access online accounts, computers, servers or even banking services is insufficient.

Read More


IoT Security Risks, GDPR and Healthcare Data

Many technology professionals are excited by the significant benefits and enhancements the Internet of Things (IoT) can bring to the healthcare sector. The future of IoT healthcare data and the enhancements that can be offered to the patient’s care are intriguing, unfortunately, there are many obstacles that must be overcome to make it a viable technology for the healthcare profession.

Read More


Can MongoDB Be HIPAA-Compliant?

When you consider a HIPAA compliant database for storing protected health information (PHI), you may wonder if a NoSQL solution such as MongoDB is a strong choice. If using MongoDB, you can take steps to make sure your database stays compliant with the Health Insurance Portability and Accountability Act (HIPAA) – both in choosing the right flavor of MongoDB and understanding its security features.

Read More


HIPAA Data Breach Answers from an Expert

Q&A With Gillware Forensics Investigator Nathan Little

Will Ascenzo is a blogger, copywriter, and technical writer for Gillware Data Recovery and Gillware Digital Forensics.

With how prevalent data breaches are in the news cycle now, data breaches seem to be every big business’ bête noire. Most at risk of data breaches and cyber attacks are organizations in the financial industry and healthcare industry. Due to the sensitivity of the healthcare data and HIPAA regulations regarding the unauthorized access to and disclosure of protected healthcare information, the threat of data breaches presents a particular problem to HIPAA-covered entities and business associates of all shapes and sizes.

Read More


Top 5 Biggest Data Breaches, and What Hosting Companies Learned

Data: our whole world runs on it in some form or fashion.

It defines our business decisions, it lets us buy anything we want, delivered the next day, and it even tells our sports teams who should bat next in the lineup.

The power of data is immense. And when that power falls into the wrong hands, it generates such enormous problems that it can take years to sort them out.

Read More


Cloud Database Hosting for Small Business: Why It’s Ideal

If you’re talking about innovation and competition in the modern economy, you will inevitably wind up talking about the subject of data. It’s no secret that we rely on data for everything whether it be strategy or tactics. This, of course, leads us to the topic of “big data” which for the past decade has been touted as the difference maker in a business’ ability to gain a better understanding of the complex factors, including customer behaviors, that are contributing to a business’ success or even failure.

Of course, simply collecting the data isn’t the whole story. There are infrastructure concerns that need to be met when implementing large databases. You need somewhere to keep your database. Not only that, but the hardware needs to be up to the task of handling the processing power required to run the database and allow it to be accessible. Many small businesses are turning to Cloud Hosting as the solution that fits their needs best.

Read More


Elasticsearch Distributed NoSQL Database – What Is It and Should You Use It?

Are you trying to decide whether or not Elasticsearch might be right for your company? Here is a look at its benefits.

  • What is Elasticsearch?
  • Features
  • One Programmer’s Perspective
  • Strong Elasticsearch Hosting

What is Elasticsearch?

Elasticsearch is a full-text, distributed NoSQL database. In other words, it uses documents rather than schema or tables. It’s a free, open source tool that allows for real-time searching and analyzing of your data. People appreciate this system because it allows you to run metrics on your data immediately, so you can understand it right away, on an ongoing basis.

Read More


How to Configure LVM (Logical Volume Management) on DRBD (Distributed Replicated Block Device)

Verified and Tested 1/20/16

Introduction

This how-to will help walk you through adding LVM to DRBD. Distributed Replicated Block Device (DRBD) is a block level replication between two or more nodes and is used as a replacement for shared storage by created a networked mirror. DRBD is used in environments that require systems or data to be Highly Available.

Prerequisites

* Two servers running Debian GNU/Linux Distribution. Other versions of Linux will work as well, but the installation packages may be different. If you need a server, you can spin up a fast and reliable cloud hosting server from Atlantic.net in under 30 seconds.
* Both servers should be directly cross-connected together, or have a separate Network Interface for private communication.
* Both servers should have the same partitioning. This walkthrough assumes that both systems have a single /dev/sdb device that is going to be used as the
DRBD volume.

Read More


What is: Backups – a Review of Basic Concepts

Target Audience

This article is aimed at a non-technical audience looking for an introduction to or review of data backup options.
.

Introduction

It’s a fact of life that computer files can be lost through human error or hardware crashes. A data backup is a process that duplicates a computer’s data files, creating copies that can be used if the originals are lost or damaged. Regular backups have been a necessary and standard part of professional computer operations for many years.

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources