1 / 34

Oklahoma Association for Home Care & Hospice

Oklahoma Association for Home Care & Hospice. Innovative Technology Symposium 2012. Home Health Tech Solutions and Security . Presented By: James B Eggert. Welcome To Home Health Tech. Mobile Technologies. Mobile devices. Laptop/Notebook Netbook PDA Smart Phone and/or iPhone

trilby
Download Presentation

Oklahoma Association for Home Care & Hospice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Oklahoma Associationfor Home Care & Hospice Innovative Technology Symposium 2012

  2. Home Health Tech Solutions and Security Presented By: James B Eggert

  3. Welcome To Home Health Tech Mobile Technologies

  4. Mobile devices • Laptop/Notebook • Netbook • PDA • Smart Phone and/or iPhone • Tablet PC

  5. Tablet PC: Notable specs • Screen Size • Touch, Stylus, or Both • WIFI &/or Cellular • Keyboard Type • Camera • OS Platform • Durability • Battery • Performance Specs

  6. Tablet PC: Operating Systems • Microsoft Windows • Apple iOS • Android • Linux (very rare)

  7. Tablet PC: Performance Specs • Processor • Memory (RAM) • Storage (Hard Drive) • Size (almost irrelevant) • Speed • 5400 RPM • 7200 RPM • Solid State

  8. Tablet PC: Connectivity • Hard Wired Ethernet (use when necessary and available) • WIFI • WIFI controller built-in to almost all mobile devices • Requires close proximity to a WIFI router or access point • Available in many restaurants, hotels, public places, and sometimes private homes • May require a password or key to access • Cellular Broadband • GSM, 3G, 4G/LTE, and others • Requires cellular broadband receiver • Some mobile devices have a built-in controller • If not, you may be able to use mobile phone as hotspot or tethered receiver • Requires paid cellular plan with local carrier

  9. Tablet PC: Connectivity Platforms • Field Mode & Sync with Server • No WIFI or cellular required • No worries about loss of signal or connectivity • Need to re-attach to home network regularly • Inconvenient & cumbersome • Compatible platforms required • Data corruption susceptible • Live/Real-Time Always-On Connection • Requires constant and reliable source of WIFI and/or cellular connection • Risk of lost data or slow response (continued…)

  10. Tablet PC: Connectivity Platforms • Live/Real-Time Always-On Connection (…continued) • Data always in-sync and up-to-date • Compatible platforms required • Efficient and productive (when good signal is available) • Live Virtual or Remote Desktop Connection • Requires constant and reliable source of WIFI and/or cellular connection • Fast response and no risk of data loss or corruption • Data always in-sync and up-to-date • Efficient and productive (when signal is good) • Various and multiple platforms work together

  11. Tablets To Review • iPad • Asus Netbook T101MT Swivel • Asus Eee Pad Slider SL101 • Asus B121-A1 EeePad • Samsung Galaxy Tab • Samsung Series 7 Slate PC • Panasonic ToughPad A1 • Panasonic ToughBook H2

  12. The New iPad Screen: 9.7” Touch Extreme Resolution Wireless: WIFI-n & 4G LTE Cellular Keyboard: Add-On Camera: Yes Platform: Mac iOS Battery: <10 Hours CPU & RAM: A5X HDD: Up to 64GB SSD Price: $499 and Up

  13. Asus Netbook T101MT Screen: 10.1” Swivel Touch w/ Stylus Wireless: WIFI-n Keyboard: Built-In w/ Touchpad Camera: Yes Platform: MS Windows 7 Pro Battery: <6.5 Hours CPU & RAM: Atom N570, 2GB HDD: 320 5400RPM Price: Approx $780

  14. Asus Eee Pad Slider SL101 Screen: 10.1” Gorilla Multi-Touch Wireless: WIFI-n Keyboard: Built-In Slider Camera: Front & Rear Platform: Android 4.0 Battery: <8 Hours CPU & RAM: Tegra Dual-Core, 1GB HDD: 16GB or 32GB SSD Price: Approx $650

  15. Asus B121-A1 EeePad Screen: 12.1” Gorilla Touch w/ Stylus Wireless: WIFI-n Keyboard: Add-On Camera: Yes Platform: MS Windows 7 Pro Battery: <4.5 Hours CPU & RAM: Intel Core i5, 4GB HDD: 64GB SSD Price: Approx $1,550

  16. Samsung Galaxy Tab Screen: 7.7” Multi-Touch Wireless: 4G LTE Keyboard: Add-On Camera: Front & Rear Platform: Android 3.2 Honeycomb Battery: <13 Hours CPU & RAM: 1.4GHz Dual-Core, 16GB HDD: 32GB + SD Card Price: Approx $550

  17. Samsung Series 7 Slate PC Screen: 11.6” Multi-Touch w/ Stylus Wireless: WIFI-n & 3G Keyboard: Add-On Camera: Front & Rear Platform: MS Windows 8 Battery: (no specs offered !?!) CPU & RAM: Intel Core i5, 4GB HDD: 128GB SSD Price: Approx $1,350

  18. Panasonic ToughPad A1 Screen: 10.1” Multi-Touch w/ Stylus Wireless: WIFI-n & 4G LTE Keyboard: On-Screen Only Camera: Front & Rear Platform: Android 3.2 Battery: Long-Life Li-Ion CPU & RAM: 1.2GHz Dual-Core, 1GB HDD: 16GB Flash Very-High Durability Price: Approx $2,100

  19. Panasonic Toughbook H2 Screen: 10.1” Dual-Touch w/ Stylus Wireless: WIFI-n & 3G or 4G LTE Keyboard: On-Screen Only Camera: Yes Platform: MS Windows 7 Pro Battery: Long-Life Dual Hot Swap CPU & RAM: Intel Core i5, 4GB HDD: 320GB 7200 or 128GB SSD Extreme Durability Price: Approx $3,900

  20. Other Brands To Check Out • Acer • Dell • Fujitsu • Lenovo • Toshiba

  21. Thanks for attending! Up Next: Network Security

  22. Network Security Topics • Hackers & Other Cyber Thugs • Viruses & ETDs • Routers & Firewalls • Servers & Passwords • Privacy & HIPPAA Compliance Tips

  23. Hackers & Cyber Thugs • Who are they? • Where are they? • Why do they do it? • How am I vulnerable? • What can I do to protect myself?

  24. Hackers: Who Are They? • Entrepreneurs • Geniuses • From all walks of life • Programmers • Thieves • Too smart for their own good, with a computer & internet connection!

  25. Hackers: Where Are They? • Next Door • College Campuses • Living with Mom & Dad • Overseas • China • Russia • Third World Countries

  26. Hackers: Why Do They Do It? • They are bored • They consider it a challenge • They want to create chaos • They want to make money

  27. Hackers: How Am I Vulnerable? • Open Internet Connections • No Router or Firewall – Direct Connection • Weak Passwords • Unsecured WIFI • Open Shares • Open Ports • Especially RDC/Terminal Services! • Email Servers

  28. Hackers: What Can I Do? • Knowing is half the battle! • Methods are always changing: Be Vigilant • Get a router • Set a stronger password • Password protect important or sensitive data • Get help! • Close open ports • Setup routers • Etc…

  29. Viruses & ETDS • Most are developed by hackers • Anti-Virus programs are good, but can’t always help you • It’s fairly easy to protect yourself, as long as you know what to do: • BE CAREFUL WHAT YOU CLICK ON! • Make sure you can trust websites you are visiting • If they are “trying too hard” to get a click – don’t do it • Don’t trust official-looking anti-virus warnings • Be aware of your AV brand • If it’s asking for money, be VERY careful • Just because it says “Microsoft, doesn’t mean it’s legit” (or Adobe, etc…) • Viruses can’t run unless you give permission or access

  30. Routers & Firewalls • Any router is better than nothing • Almost any router will provide basic protection from most attacks • Router VS Firewall • Router is usually simply a device for connecting computers and sharing internet and network resources • Most routers have at least some firewall functionality built in • A firewall is a must more advanced version of a router which actively inspects network and internet traffic for potential problems • Routers and Firewalls cannot always protect from viruses • Some firewalls can inspect files for malicious content • Must always be updated and relevant for current attacks • Hackers use viruses (especially Trojans) to get access thru firewalls • Most Important – routers/firewalls manage ports and traffic

  31. Servers & Passwords • Check servers for open ports • RDC 3389; Email 110, 25; FTP 21, Telnet 23 • Check for unused or unknown Admin accounts • Know what all accounts are for – remove others • Check all accounts for remote access • Double-Lock policy for sensitive programs or resources • Set multiple authentication points • Use different passwords! • Test for vulnerabilities (you may need help with this (continued…)

  32. Servers & Passwords (…continued) • Establish an organization wide password policy • Ensure strong password for anyone who has access to critical or sensitive data • Seven characters or more • Upper & Lower case letters • Numbers & letters • Special characters • Random as possible • Change passwords often

  33. Privacy & HIPPAA Compliance • Disclaimer  • Concerns • Patient records on mobile devices • Unauthorized access to privileged servers or workstations • Be careful of others standing too close – may be able to read sensitive patient data • Theft of devices or other hardware with data stored locally • Tips • Passwords! Or use biometric authentication • Consider encrypting Storage Devices • Thoroughly destroy residual data on old hardware after upgrades, etc

  34. Thank you for attending! The End

More Related