HIPAA Compliant Hosting

HIPAA vs. HIPPA

HIPPA compliance? No, HIPAA compliance.

HIPAA is the Health Insurance Portability and Accountability Act of 1996. HIPPA is simply a typo. Probably in part because English would typically put two Ps together in the middle of a word (think oppose or appear), HIPAA is often wrongly spelled as HIPPA. It really is extremely difficult to remember how to spell HIPAA, and it is certainly easy to write the acronym incorrectly if you are moving quickly. This article explores topics related to the misspelled form HIPPA, partially as entertainment. It concludes with a brief outline of HIPAA and the Security Rule, more serious considerations.

Read More



Improve HIPAA Compliance with Secure Messaging

Adnan Raja November 7, 2017 by under HIPAA Compliant Hosting 0 Comments

When Congress enacted the Final Omnibus Rule in 2013, many healthcare organizations, doctors and administrators became concerned about how they and their entities would maintain HIPAA compliance. As these individuals soon found out, HIPAA compliance was difficult to implement and maintain. The biggest challenges administrators faced was understanding what HIPAA-compliance meant and realizing what they needed to change in their day-to-day workflow in general and communications, in particular.

The goal of this blog is to bring some clarity to the issues that have arisen around HIPAA compliance for healthcare institutions as well as to highlight how the adoption of secure messaging solutions can improve compliance.

Read More


Can You Learn HIPAA Compliance in 5 Minutes?

With anything that’s complex and multi-faceted, it is not always easy to explain it to others. Oddly enough, it sometimes seems especially difficult to convey ideas when we are highly trained in the subject. We start to take the broader, basic-to-intermediate knowledge we have for granted, glossing over it as we focus at a higher level. Conversely, when we are learning about something new, it helps when we can get simplified, “boiled-down” essentials without any unnecessary legal jargon or other distractions. Well, here is an attempt to get to the essence, a Quick-Start Guide of sorts for HIPAA compliance that should only take you another 270 seconds or so to read. Forgive the lack of transitions from here forward – nuts and bolts only!

Read More


Finding HIPAA Hosting Solutions as a Small Business Owner

Operating within the healthcare industry can be challenging. There are many moving parts that must be accounted for, whether you’re a new startup firm or a large network of hospitals. When most small business owners are looking for hosting solutions, the only concerns are cost and the capability of the hardware to meet the needs of a website. The options are endless when it comes to finding simple hosting. When it comes to firms in the medical sector, there are special considerations to be had.

Your hosting options are significantly narrowed when looking for HIPAA-compliant hosting. Small business owners working in healthcare must seek out hosting companies that specialize in HIPAA compliance. Relatively speaking, few hosting companies can provide this service because of what it entails. Powerful hardware is just one part of the equation. There must also be a long list of security measures put in place to protect sensitive data. This strict set of regulations is the reason why you can’t trust your hosting with just anyone. It’s also why many hosting companies can’t offer this service and why trying to establish local infrastructure to handle these duties isn’t the best option. Part 2 of this document released by the SANS Institute delineates what is required at the local level to remain compliant with HIPAA regulations.  Maintaining HIPAA compliance at the hardware level is cost-prohibitive for most firms and a host is required.

Finding a hosting provider that can meet your organization’s needs can seem daunting, but there are a number of things to be aware of when seeking out a HIPAA-compliant hosting solution. Here are some general guidelines to keep in mind when looking for the right hosting solution for your business.

Read More


SSAE 16, SSAE18, SOC 1, SOC2: What they are and why you should care

Cloud computing has revolutionized the world of software licensing, but it has also opened the gates to new security risks. In the past, if a company wanted to add new software, it had to endure long installation processes on local servers. This gave companies the opportunity to verify the reliability of their systems, while local hosting gave them more control over their data. However, it was also immensely time-consuming and costly to set up and maintain.

Read More


DIY Security: Why It’s Usually a Bad Idea for Most Businesses

Do-it-yourself is a popular mantra among many people building websites, doing home renovations, or marketing artistic and cultural products.  Unfortunately, however, it is not an appropriate approach for some things; like network security.  Just like a home renovation DIY project gone horribly wrong, organizations taking on cybersecurity roles outside of their core competency could cause themselves ruinous, avoidable expense.

Some companies make the decision to be wholly responsible for their network security intentionally, perhaps due to cost considerations, or a lack of understanding about the frequency and harm of security incidents.  For some companies, it was simply neglected, or a tiny startup in stealth mode grew too quickly for management to keep up with all demands.

The cost of network downtime for enterprises is $5,600 per minute, which is close to $300,000 per hour.

According to Gartner research, the cost of network downtime for enterprises is $5,600 per minute, on average, which is close to $300,000 per hour.  Worse, Ponemon research found that the average total cost of a data breach in 2016 was $4 million.  Protecting against that kind of risk is a job for professionals.  Keeping a network secure can be easy.  You just have to have the right help.

Read More


Is Two-Factor Authentication Necessary? How Do I Get My Employees to Use It?

Contributing writer: Ahmed Muztaba

Why is two-factor authentication necessary?

Today, nothing is more valuable than information. Because the majority of online content is behind the lock and key of the so-called “deep web,” it’s no wonder that hackers are more interested than ever in ferreting out secure information. Today’s great heist doesn’t require a cat burglar. A mouse is easier to maneuver.

Two-factor authorization (or 2FA) arose as a bulwark against the hijinks of Internet pirates whose Trojan Horses and phishing scams were netting easy prey. The premise is simple: by requiring a second layer of verification, it makes your data twice as hard to access illegally. You can see this everywhere; from the chip-and-pin credit card requirements to the “secret questions” that some websites require their users to answer.

By reducing the points of vulnerability in your company, both company and employee sensitive data can remain far less likely of being breached. Requiring strongly-typed password used to be enough, but with the increase in computing power and prevalence of botnets, a person or organization with malicious intent can have an immense amount of resources to harness. This means that once touch-to-crack passwords are now much easier to crack. By requiring a second layer of authentication that requires a code to be entered within a given amount of time before expiring, this can greatly prevent widespread damage.

Read More


I need HIPAA-compliant hosting. How do I get started?

So you need HIPAA-compliant hosting, and you want to know what the basics to get started are. Before we delve into the details, it helps to know the different types of companies that are concerned with HIPAA, in order to understand your relationship with the hosting provider.

 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines two different types of organizations that must meet its parameters: covered entities and business associates. However, there is now a third type of organization that falls under HIPAA rules. Here is basic descriptive information for these categories from the National Institutes of Health (NIH)[i]:

Read More


What is HIPAA Hosting and why do I need it?

Economy-class hosting vs. first-class HIPAA hosting

A hard fact of the Internet is that you need machines to be part of it – either on your own or as a service. If you are in the healthcare field and don’t want to set up servers for your website or other services in your own datacenter, you need HIPAA hosting.

All hosting is not created equal. Because there is a disparity of security and other checks and balances from one system to another, standards were created to guide oversight of infrastructure and maintain proper protection of patient data. Those standards were developed by the US Health and Human Services Department (HHS), as directed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Hence, beyond simple web hosting, anyone who is aiming to secure healthcare records needs HIPAA compliant hosting, sometimes called simply HIPAA hosting.

Read More


New York, NY

100 Delawanna Ave, Building 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada