HIPAA Compliant Hosting

ECC Memory vs. Non-ECC Memory – Why It’s Critical for Financial and Medical Businesses

By: Kris Fieler

As businesses depend more on big data, the need to prevent data loss has never been more important. One of the most vital areas for this loss prevention is where data is temporarily stored, RAM.  ECC, or Error-Correcting Code, protects your system from potential crashes and inadvertent changes in data by automatically correcting data errors.  This is achieved with the addition of a ninth computer chip on the RAM board, which acts as an error check and correction for the other eight chips. While marginally more expensive than non-ECC RAM, the added protection it provides is critical as applications become more dependent on large amounts of data.

ecc-vs-nonecc

Likelihood of a Memory Error

On any server with financial information or critical personal information, especially medical, any data loss or transcription error is unacceptable.  Memory errors can cause security vulnerabilities, crashes, transcription errors, lost transactions, and corrupted or lost data.

Read More


Risk Management for Healthcare Cloud Hosting

Following a two-year deceleration of cloud growth, the technology again gathered steam in 2015. With the vast majority of healthcare providers now adopting cloud, it’s become critical to consider risk management for this transition. Here is a five-stage plan to see your organization through.

  • Slow-Down & Speed-Up of Cloud in Business
  • Hybrid Cloud and Risk Management in Healthcare
  • Five-Stage Cloud Risk Management for HIT
  • Managing HIT risk with Your cChoice of Cloud Vendor

Slow-Down & Speed-Up of Cloud in Business

In 2013 and 2014, there was a slow-down in the previously breathtaking ascent of cloud hosting. However, last year, the industry accelerated again, with 5.4% more organizations adopting the IT method.

Business generally has been moving to cloud, but healthcare companies have been somewhat more hesitant to implement these systems because of concerns with compliance and security. Nonetheless, 5 of 6 healthcare providers (83%) had cloud in place even back in 2014, according to the Health Information and Management Systems Society (HIMSS). Furthermore, Becker’s Healthcare notes in 2016 that “[c]ompared to previous years, providers are more likely to use cloud implementations and leverage mobile and analytics capabilities in the cloud than before.”

Read More


How Do We Prevent Hacking on the Cloud Through Authentication?

Failure to adopt two-factor authentication (2FA) or multifactor authentication (MFA) can be a major and costly mistake for those using cloud services. Adding security can make it less likely that you get hacked. Here are some tips to incorporate 2FA or MFA into your business.

  • Could Hacking End Your Business?
  • Factors to the Rescue
  • How Does 2FA Work Exactly?
  • 2FA in Action – 3 Steps of Access
  • Trusted for Years

Could Hacking End Your Business?

Getting hacked and potentially bankrupted is one of those things that, like a car crash or an illness, can seem to be an unlikely threat until it happens to you. The figures for small business, though, are incredible: one in five small businesses get hacked each year, and 60% of those that do are bankrupt within six months. In other words, a scary percentage of small businesses get hacked each year, and for the majority of those that do, it’s “game over.”

Read More


Could Cloud Computing Cure Cancer?

Angelina Jolie used genomic sequencing to learn that she was highly likely to eventually develop breast cancer, allowing her to make an informed decision and get a double mastectomy. However, celebrities aren’t the only ones who can benefit from advanced genetic analysis – which is now much more affordable and accessible thanks to projects such as the Collaborative Cancer Cloud.

  • Angelina Jolie: Survival through Personalized Cancer Data
  • Expediting Healing with the Collaborative Cancer Cloud
  • Spinning Up Your Own Cloud Server

Angelina Jolie: Survival through Personalized Cancer Data

Angelina Jolie was told by her doctors in 2013 that she had a problematic variant of the BRCA1 gene that put her in an extremely high-risk category for breast cancer. In fact, it meant that her likelihood of developing the disease was a whopping 87%. Understanding how very real the threat of cancer was for her simply because of hereditary factors, Jolie opted to get a preventive double mastectomy – which effectively nullified her chances of getting the illness, dropping her to just 5% susceptibility.

Read More


HIPAA Compliant Hosting Hangout with Gabriel Murphy

The hack of Anthem, the second largest health insurer in the United States, cast a huge spotlight on the protection of electronic medical records. Announced in February 2015, the breach compromised 78.8 million user accounts, all of which were stored unencrypted.

To put that number into perspective, the largest breach of 2014 (which, like Anthem, is widely believed to be the work of security researchers sponsored by the Chinese government) was that of Community Health Systems in Tennessee, an incident in which “only” 4.5 million patients were affected.

Although experts and consumers are concerned that health data should always be encrypted, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) does not explicitly require encryption. That is the topic of an article by Elizabeth Snell for HealthIT Security: “Should HIPAA Regulations Require Data Encryption?”

Snell argues that while insurers and other healthcare entities do not legally have to encrypt, “this does not mean that facilities can simply ignore this particular security measure because they find it time consuming or costly.” She details how legislators around the United States are working to pass measures so that encryption is no longer optional.

We explored the topic of HIPAA compliance in the first episode of our Google Hangout on Air (HOA) series (see the video above). The HOA featured Internet entrepreneur and development technologist Gabriel C. Murphy, who has cofounded four Internet companies and been a thought leader in the hosting industry since 1997.

Atlantic.Net is an industry leader in HIPPA Compliant Hosting with a full array of Cloud Servers ready to deploy in under 30 seconds.


HIPAA Compliant Hosting Hangout with Gene Geiger

Much of the focus on healthcare technology is on its dark side, the potential that the information will be hacked. That’s a reasonable concern, especially given the gigantic exposure of user data at Anthem, which many security experts now believe originated with government-sponsored IT security researchers in China.

Well, here’s the light side: healthcare technology is saving lives – as demonstrated by a recent Information Age article by Bryan Lewis of the Virginia Bioinformatics Institute (VBI): “How Big Data is Beating Ebola”. VBI is a firm that specializes in computational epidemiology, which essentially means that they study data related to epidemics to better control the spread of disease and determine the degree of success achieved by public health efforts.

In order to properly understand how the disease might spread, VBI designed a virtual model containing populations that were each assigned adjustable characteristics. The virtual geographic environment was fed information including race, sex, age, typical family arrangements, travel between different areas, and gatherings – essentially a predictive analytic model on a worldwide scale.

The synthetic data “was created in such a way that it mirrored actual census, social, transit and telecommunications data patterns from the targeted population,” explained Lewis.

The resultant sophisticated system allowed VBI to help improve the response to the disease and minimize its death toll, which exceeded 9000 as of January 2015.

While the Anthem hack reminds us that technology with patient data must be incredibly secure, the positive impact of computing on healthcare is truly remarkable. We must build systems that improve the effectiveness of healthcare while never forgetting the security concerns when handling protected health information (PHI).

The second episode of our Google Hangout on Air (HOA) series (see the above video), featured Gene Geiger, one of the founding partners of security and compliance firm A-lign. We spoke with Geiger about the general security climate and compliance with the Healthcare insurance Portability and Accountability Act of 1996 (HIPAA).  Atlantic.Net offers a full lineup HIPAA Compliant Servers to support HIPAA storage hosting or other HIPAA-compliant hosting services..

By Moazzam Adnan


8 Docker Features for IT Management

Sam Guiliano February 19, 2016 by under HIPAA Compliant Hosting 0 Comments

Docker’s adoption has more than doubled since a year ago. Here is a look at its growth and top features that many companies will find useful.

  • Growth of Docker Astronomical
  • New Docker Release: Main Features for IT Management
  • One-Click Docker for Immediate Use

Growth of Docker Astronomical

Have you heard the news? Many people certainly consider Docker useful, and it is also one of the trendiest tools in IT. Hence, its adoption and use are growing incredibly. In February 2016, Docker reports that its 400,000 registered users have a total tally of 2 billion pulls – that’s four times as much action as the technology had seen in February 2015. The data comes from the Docker Hub.

Read More


A Brief Look at Salt

SaltStack, or simply Salt, is a configuration management system used by many people to make managing servers and configuring software much simpler.

  • Why is Salt Useful, and How is it Unique?
  • How to Install Salt
  • Establishing Your Master & Minion
  • Getting Salt Up & Running

Why is Salt Useful, and How is it Unique?

Yes, SaltStack Is a configuration management system – but since that term is a little dense, it helps to think of it as a tool that solves specific problems. Basically, it comes in handy when you have more than one server. Without anything to help manage your entire system, you have to log into each machine independently to perform whatever functions you want on each server. Typical tasks you might need to do would be rebooting it or seeing how long it’s been on. You also might want to install a program and set up the configuration to meet your own needs. Or you might want to create additional users and establish their privileges.

Read More


Quick Docker Facts

Adnan Raja December 2, 2015 by under HIPAA Compliant Hosting 0 Comments

Docker is on everyone’s minds as a potential way to improve packaging and shipping of applications. Here’s what you need to know.

  • Docker allows for packaging and distribution of applications.
  • Docker isn’t a completely new idea.
  • You don’t have to use Linux.
  • It’s much faster than starting a VM.
  • Virtual machines aren’t yet obsolete.
  • Docker’s adaptation is incredibly fast.
  • Wade before you dive.

Docker has risen to incredible prominence since it was first introduced as an open source project in 2013. In fact, as of March, it was either in use or in the planning stages for  nearly half of companies, notes Forbes. At the time, it had been adopted by more than one in eight companies (13%), while 35% were preparing to implement it.

There’s a tendency to forgive technologies for their weaknesses as they start to become a more standard choice. It’s necessary to look at Docker from all angles.

Here are a few things to understand about this container technology:

Read More


The Rise and Success of Docker

Sam Guiliano October 26, 2015 by under HIPAA Compliant Hosting 0 Comments
  • The Unlikely Rise of Docker
  • Why Okta Developers Love Docker
  • Biggest Hurdles of Using It

The Unlikely Rise of Docker

In 2014, a startup called Docker started to gather an incredible amount of attention. The momentum started building in March 2013, when the company’s founder, Solomon Hykes, introduce the technology at the developer conference PyCon in a keynote presentation entitled “Lightning Talk: The future of Linux Containers.” By the end of last year, the wellspring of excitement for Docker had reached a fever pitch – with enterprises including Amazon, Google, Microsoft, HP, Dell, Red Hat, and VMware all clamoring to join forces with the company, which then had just 70 employees.

Read More


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.