Atlanta Data Protection
Atlanta Remote Backup Service   Home Page Email us
Affordable Online Backup   Home Page Email us
 
 What We Do - Online Backup
 Our Pricing - Remote Backup
 Frequently Asked Questions - Data Backup
 Flash Demo - Data Protection
 Contact Us - Computer Backup
 Return to Home Page
 

 

 

Q:   What if we already have a tape backup system?

Q:   I'm a healthcare provider. Is this service HIPAA compliant?

Q:   How long does a remote backup take?

Q:   Onsite, Offsite - What's The Difference?

Q:   Why Are Remote Backups Considered More Beneficial?

Q:   How Secure Are Remote Backups?

Q:   What is encryption?

Q:   Do you have references?

Q:   How do I recover my data after a hard drive or system loss?


Q:   What if we already have a tape backup system?

Using a tape backup system and a remote backup system offers the best of both worlds. Critical files, like billing, customer contact files and databases can be kept on the remote backup system. While, the tape system can be used to create a full backup of the entire system once or twice a month, instead of on a daily basis. The tapes and drive will last longer and require less maintenance. The remote backup system can provide a quick and easy way to retrieve critical files and databases without the hassle of searching through tapes.

Back

Q:   I'm a healthcare provider. Is this service HIPAA compliant?

The HIPAA Final Security Rule published in February 2003 requires that covered entities have appropriate safeguards to protect Patient Health Information (PHI) in place by April 21, 2005. Two examples of "appropriate safeguards" that are given are:

1. Establishment of appropriate Data Backup, Disaster Recovery and Emergency Mode Operation planning.

2. Establishment of technical security mechanisms such as encryption to protect data that is transmitted via a network.

Our services can form a critical part of Data Backup, Disaster Recovery, and Emergency Recovery Mode Operation strategies by providing offsite backups that can be geographically distant from the client site to minimize the likelihood of data loss in case of a disaster. Our service also encrypts your data before sending it across the Internet to our storage facility and therefore meets the second example given above. Furthermore, data on the ETS server is backed up daily onto removeable media and placed in a bank vault. In summary, ETS' Remote Backup and Recovery Service helps healthcare providers be compliant with HIPAA regulations.

Back

Q:   How long does a remote backup take?

The time it takes to backup up remotely is not much different then the time it takes to back up locally. The exact answer is based upon how much data needs to be backed up and what your upload connection speed is to the Internet. On average, offices with high-speed internet connections find a typical incremental backup session takes approximately 20-30 minutes. The initial backup can take a full night, or longer, to complete. We recommend backing up the most important files first and then selecting other files as the backup progresses. Or, the initial backup can be run over the weekend. We also offer an optional service where we come to your office and make the initial backup of your system.

Back

Q:   Onsite, Offsite - What's The Difference?

Basically, remote backups work like regular tape backups, with one important difference. Instead of sending backups to a tape drive or other media attached to the computer being backed up, a remote backup sends encrypted file data over the internet to a computer file storage system safely off-site.

This usually happens at night while your business is closed and nobody is using the computers. It's completely automatic. In fact, you may forget it's working every night.

Back

Q:   Why Are Remote Backups Considered More Beneficial?

The data is immediately stored off-site using an automated backup system. Also, only an internet connection is needed. Completely eliminating the need for expensive backup equipment, media and carrier services. And, since the system is automated, manual labor is eliminated.

Back

Q:   How Secure Are Remote Backups?

Very. All files are secured using user selectable AES, DES, TDES (default) or Blowfish encryption technology. Each user has a personal and unique encryption code (key) known only by the client (ETS never sees or receives the key).

Back

Q:   What is encryption?

Encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organizations and individuals with a need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines. (From Wikipedia).

Back

Q:   Do you have references?

Absolutely! Here's a few testimonial letters we've received from our customer base: Letter1 , Letter2 , Letter3 ,

Back

Q:   How do I recover my data after a hard drive or system loss?

There are 2 ways you can do a Disaster Recovery Operation:

1) Using the Encryption Key Disk/File: (This is the very best way.)

First, install a fresh client on the new system by clicking here. When prompted for 'New Registration' or 'Disaster Recovery' - Select Disaster Recovery. The client will prompt you for the Key Disk. If you have the Key disk (CD, DVD or floppy disk that contains your encryption key information) - answer Yes. The client will then ask you to identify the folder on the Key Disk where the Key information is located. After reading the file, the software will contact the server and restore the latest catalog file from the server. Upon successfully recovering the catalog, the software will ask you to restart the application. Afterwards you will be able to restore files from the Restore window.

2) Using a printout of the encryption key information

After installing the client software (click here) and selecting the 'Disaster Recovery' Option: Answer 'No' when prompted for 'Do you have the Encryption Key Disk?'. The client will present you a new form, where in you can manually enter the Username, Password, Encryption method and Key information. After entering the details, the client will start the Disaster Recovery process and restore the latest catalog from the server. Afterwards you will be able to restore files from the Restore window.

Back
 

 
What We Do | Pricing | FAQ | Demo | Contact Us

2006 Essential Technology Services, Inc.
215 Hammersmith Drive, Suwanee, GA 30024-8562
Phone: 404-434-7776 Fax: 678-669-1075