What You May Not Know (But Should) About HIPAA Compliance

5 Things to Kno

If your company works with sensitive personal health information, you know how important it is to keep this information from being accessed or seen by anyone who isn’t authorized to view it. This can be people in your office as well as people outside your company, who breach your computer security protocols.

HIPAA, the Health Information Portability and Accountability Act, which was enacted in 1996, requires all companies that deal with sensitive health care information, not just health care providers, to put in place the necessary security systems to keep that information from being seen by or disclosed to unauthorized persons. However, being HIPAA compliant isn’t just about putting up a firewall and having your systems password protected.

Continue reading

Posted in Managed Hosting, Security, Technology | Comments Off on What You May Not Know (But Should) About HIPAA Compliance

4 Common Managed Hosting Proposal Traps You Need to Avoid

tape edges

There are several choices out there for business owners in regards to outsourcing their servers and their data. Many companies are overwhelmed with options, and some end up choosing providers that look good on paper, but in reality don’t hold up their end of the deal.

Did you know that the Truth in Advertising laws require that all claims be backed up by proof, no matter where an ad appears, including online? In the case of fraud, the Federal Trade Commission takes action to stop the scam by filing suit, freezing the perpetrator’s assets, and obtaining compensation for the victims. The FTC “looks especially closely at advertising claims that can affect consumers’ health or their pocketbooks – claims about…conduct related to high-tech products and the Internet…”

While that’s some consolation, unfortunately it is still very easy for unknowing consumers to be lured into fraudulent proposal traps when it comes to choosing from the many managed hosting providers vying for their dollar. Here are four areas in which the majority of the “too good to be true” claims are hiding.

Continue reading

Posted in Managed Hosting, Support, Technology | Comments Off on 4 Common Managed Hosting Proposal Traps You Need to Avoid

Vlad Friedman: Finalist for E&Y Entrepreneur Of The Year Award 2015

2015-EOY-Regional-Finalist-LogoWe’re so proud and excited to announce that Vlad Friedman, Founder and CEO at Edge Hosting, is a finalist for the 2015 Ernst & Young Entrepreneur Of The Year award!

Vlad Friedman - Edge Hosting - HeadShotThe Ernst & Young Entrepreneur Of The Year award is recognized as one of the most prestigious business awards program in the country.  Awards are given to entrepreneurs who have demonstrated excellence and extraordinary success in such areas as innovation, financial performance, industry impact, risk, personal commitment and more.

Being selected as a finalist is an honor in itself and is a testament to the outstanding achievement that each finalist has contributed to the regional business community.

Edge Hosting was founded by Vlad nearly two decades ago, and has grown to become a national player in the fully managed hosting environment for mission critical applications.

The winner will be announced on Thursday June 25, 2015 at The Baltimore Marriott Waterfront hotel.

 

Posted in CEO's Desk | Comments Off on Vlad Friedman: Finalist for E&Y Entrepreneur Of The Year Award 2015

5 Questions to Ask A Managed Hosting Provider

5 Questions To Ask Your Hosting Provider

Do you realize that every 30 seconds, more than $1.2 million changes hands online, thanks to e-commerce sites? Even if you don’t sell tangibles or services online, chances are high that your company has an established web presence for marketing.

As you grow your business, your need for more complex and personalized web features also grows. Perhaps you’ve not given much thought to your managed hosting provider’s capabilities until now, but as the demand for your company’s services increases, you need to pose some critical questions to your existing provider.

If the answers you receive result in the need to switch providers, these questions can help you prequalify a new provider before you sign on that dotted line.

Continue reading

Posted in Managed Hosting, Security, Support, Technology | Comments Off on 5 Questions to Ask A Managed Hosting Provider

Learning Android Forensics

Learning Android Forensics – EBOOK Review

Book CoverForensics is the methodology of gathering data needed to uncover information that can be used to solve a crime. By following along with this book, you’ll learn most of the latest practicable technologies utilized in Android related forensics.

This book is packed with so much information simply reading it twice isn’t enough, you’ll need to make a few pots of coffee in order to digest all the information made available in this book.

Author Rohit Tamma takes a unique approach to organizing and presenting material in this book. While the humor lacks in the book it is technically sound and straight forward. After reading the book, you’ll learn how to recover deleted files, application data, and the many methods to do so are covered.

I’ve looked over this book a few dozen times already and still shake my head at the various recovery options available despite the ‘security’ appliances utilized on the device and how easily they’re bypassed. So in short, don’t do anything that you’d have to hide or you’ll be pretty shocked when they uncover the deleted data you thought was gone forever! Continue reading

Posted in Security, Technology | Tagged , , , , , | Comments Off on Learning Android Forensics

DoD Approves Edge Hosting Commercial Cloud Service Offerings – FedRAMP

logo3

We’re proud to announce that the Defense Information Systems Agency granted a Department of Defense Provisional Authorization (PA) for cloud service offerings to host DoD mission data up to Impact Level 2 in a cloud environment to Edge Hosting!

The exact offering is:
Edge Hosting CloudPlus – Managed Cloud for Secure Windows and Linux Application Hosting.  Service Model: Platform as a Services (PaaS) and Infrastructure as a Service (IaaS).  FedRAMP Agency ATO by Department of Labor.

Continue reading

Posted in Press Releases | Comments Off on DoD Approves Edge Hosting Commercial Cloud Service Offerings – FedRAMP

Edge Hosting Completes HIPAA HITECH Audit Without Exceptions

BALTIMORE, MD (April 2015) HIPAA-ComplianceEdge Hosting, LLC, a leader in secure, scalable and transparent managed hosting services, today announced the culmination of annual auditing against the Security Rule of The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and The Health Information Technology for Economic and Clinical Health (HITECH) Act. The third party auditor concluded “that the applicable trust services criteria and Administrative, Technical and Physical Safeguards associated with the Security Rule of HIPAA were met and operated effectively” throughout the annual testing period. Continue reading

Posted in Press Releases | Comments Off on Edge Hosting Completes HIPAA HITECH Audit Without Exceptions

Edge Hosting Completes SSAE 16 Audit Without Exceptions

BALTIMORE, MD (April 2015) SOC2Edge Hosting, LLC, a leader in providing secure, scalable and dependable managed hosting services, today announced the annual attainment of the Statement on Standards for Attestation Engagements (SSAE) 16 Service Organization Control (SOC) 2 Type II standards compliance. Assessed by auditors from CliftonLarsonAllen (CLA), this certification demonstrates the company’s commitment to the highest compliance standards of operational excellence for its customers around the world. Continue reading

Posted in Press Releases | Comments Off on Edge Hosting Completes SSAE 16 Audit Without Exceptions

Best Practices for Securing WordPress

WordPress is one of the easier to use and more popular CMS’s out there.  Unfortunately due to its popularity, it is also one of the more targeted software as well.  That’s the bad news.  The good news?  There are recommendations to follow for securing WordPress, which will mitigate the risk of a compromise. Continue reading

Posted in Security | Tagged , | Comments Off on Best Practices for Securing WordPress

Edge Hosting Launches New Secure Data Center in Phoenix

DC3-MapEdge Hosting, a national provider of secure managed hosting solutions, announced today the opening of a new state-of-the-art data center in Phoenix, Arizona that offers redundant, reliable and responsive solutions in a disaster free environment. Edge continues its rapid expansion in multiple geographies to accommodate customer demand.

“We chose Phoenix for its absence of weather, geographic diversity and proximity to the west coast. Organizations will have the ability to host their applications in a location of their choice, and run production and disaster recovery at several locations concurrently. By cross replicating applications in real time between multiple data centers customers will achieve RTO/RPO (recovery time and point objectives) that were previously only attainable by the largest of enterprises,” said Vlad Friedman, Founder/CEO at Edge Hosting.

Continue reading

Posted in Press Releases | Tagged | Comments Off on Edge Hosting Launches New Secure Data Center in Phoenix