HIPAA Compliant Hosting

A Brief Look at Salt

SaltStack, or simply Salt, is a configuration management system used by many people to make managing servers and configuring software much simpler.

  • Why is Salt Useful, and How is it Unique?
  • How to Install Salt
  • Establishing Your Master & Minion
  • Getting Salt Up & Running

Why is Salt Useful, and How is it Unique?

Yes, SaltStack Is a configuration management system – but since that term is a little dense, it helps to think of it as a tool that solves specific problems. Basically, it comes in handy when you have more than one server. Without anything to help manage your entire system, you have to log into each machine independently to perform whatever functions you want on each server. Typical tasks you might need to do would be rebooting it or seeing how long it’s been on. You also might want to install a program and set up the configuration to meet your own needs. Or you might want to create additional users and establish their privileges.

Read More

Quick Docker Facts

Adnan Raja December 2, 2015 by under HIPAA Compliant Hosting 0 Comments

Docker is on everyone’s minds as a potential way to improve packaging and shipping of applications. Here’s what you need to know.

  • Docker allows for packaging and distribution of applications.
  • Docker isn’t a completely new idea.
  • You don’t have to use Linux.
  • It’s much faster than starting a VM.
  • Virtual machines aren’t yet obsolete.
  • Docker’s adaptation is incredibly fast.
  • Wade before you dive.

Docker has risen to incredible prominence since it was first introduced as an open source project in 2013. In fact, as of March, it was either in use or in the planning stages for  nearly half of companies, notes Forbes. At the time, it had been adopted by more than one in eight companies (13%), while 35% were preparing to implement it.

There’s a tendency to forgive technologies for their weaknesses as they start to become a more standard choice. It’s necessary to look at Docker from all angles.

Here are a few things to understand about this container technology:

Read More

The Rise and Success of Docker

Sam Guiliano October 26, 2015 by under HIPAA Compliant Hosting 0 Comments
  • The Unlikely Rise of Docker
  • Why Okta Developers Love Docker
  • Biggest Hurdles of Using It

The Unlikely Rise of Docker

In 2014, a startup called Docker started to gather an incredible amount of attention. The momentum started building in March 2013, when the company’s founder, Solomon Hykes, introduce the technology at the developer conference PyCon in a keynote presentation entitled “Lightning Talk: The future of Linux Containers.” By the end of last year, the wellspring of excitement for Docker had reached a fever pitch – with enterprises including Amazon, Google, Microsoft, HP, Dell, Red Hat, and VMware all clamoring to join forces with the company, which then had just 70 employees.

Read More

Q & A: HIPAA Compliant Report Writer Control System

Since we focus so much on the healthcare industry, we regularly receive questions from HIPAA covered entities and their tech partners looking for compliant hosting services. We were recently contacted by a customer interested in encrypted storage, remote access, Web (Apache) and DB (MySQL) servers for a HIPAA-compliant report writer control system (RWCS).

Here is an excerpt of our interaction, sourced from the real transcripts. (Note: Anonymity is maintained, and any intellectual property or other sensitive details are omitted.)

Read More

Do I Need to Be HIPAA Compliant?

  • Who Needs to Be Compliant?
  • The Role of the Healthcare Clearinghouse
  • Interviewing Business Associates
  • Making Strong HIPAA Choices

Who needs to Be Compliant?

You need to be compliant with the Health Insurance Portability and Accountability Act if you are a covered entity or business associate. Business associates are a catch-all group that includes any company performing a service for covered entities that exposes it to protected health information (electronic health records or other data). Covered entities include health care providers, health care plans, and health care clearinghouses.

Read More

How to Comply with HIPAA

How do you comply with the Health insurance Portability and Accountability Act (HIPAA)? This article covers the four basic elements of the regulations. It also discusses myths associated with the basic compliance testing method, security risk analysis – most notably that a HIPAA risk analysis checklist is insufficient for compliance.

Read More

How to Protect Privacy While Maintaining HIPAA Compliance

There are plenty of checklists and guidebooks out there related to HIPAA compliance. However, it helps to go to the source to see what specific HIPAA controls are necessary to safeguard protected health information. Here are specific details on how to follow the Security Rule, as indicated directly by HHS guidelines:

  • Basic Guidelines
  • Vulnerability Assessments
  • Administrative HIPAA Controls
  • Physical HIPAA Controls
  • Technical HIPAA Controls
  • The Role of Business Associates

Basic Guidelines

The Security Rule states that healthcare organizations must properly protect ePHI using reasonable administrative, technical, and physical HIPAA safeguards.

The following must be achieved:

Read More

New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4