MOBILE DEVICES Laptop/Notebook Netbook PDA Smart Phone and/or iPhone Tablet PC
TABLET PC: NOTABLE SPECS Screen Size Touch, Stylus, or Both WIFI &/or Cellular Keyboard Type Camera OS Platform Durability Battery Performance Specs
TABLET PC: OPERATING SYSTEMS Microsoft Windows Apple iOS Android Linux (very rare)
TABLET PC: PERFORMANCE SPECS Processor Memory (RAM) Storage (Hard Drive) Size (almost irrelevant) Speed o 5400 RPM o 7200 RPM Solid State
TABLET PC: CONNECTIVITY Hard Wired Ethernet (use when necessary and available) WIFI WIFI controller built-in to almost all mobile devices Requires close proximity to a WIFI router or access point Available in many restaurants, hotels, public places, and sometimes private homes May require a password or key to access Cellular Broadband GSM, 3G, 4G/LTE, and others Requires cellular broadband receiver Some mobile devices have a built-in controller If not, you may be able to use mobile phone as hotspot or tethered receiver Requires paid cellular plan with local carrier
TABLET PC: CONNECTIVITY PLATFORMS Field Mode & Sync with Server No WIFI or cellular required No worries about loss of signal or connectivity Need to re-attach to home network regularly Inconvenient & cumbersome Compatible platforms required Data corruption susceptible Live/Real-Time Always-On Connection Requires constant and reliable source of WIFI and/or cellular connection Risk of lost data or slow response (continued…)
TABLET PC: CONNECTIVITY PLATFORMS Live/Real-Time Always-On Connection (…continued) Data always in-sync and up-to-date Compatible platforms required Efficient and productive (when good signal is available) Live Virtual or Remote Desktop Connection Requires constant and reliable source of WIFI and/or cellular connection Fast response and no risk of data loss or corruption Data always in-sync and up-to-date Efficient and productive (when signal is good) Various and multiple platforms work together
TABLETS TO REVIEW iPad Asus Netbook T101MT Swivel Asus Eee Pad Slider SL101 Asus B121-A1 EeePad Samsung Galaxy Tab Samsung Series 7 Slate PC Panasonic ToughPad A1 Panasonic ToughBook H2
The New iPad Screen: 9.7” Touch Extreme Resolution Wireless: WIFI-n & 4G LTE Cellular Keyboard: Add-On Camera: Yes Platform: Mac iOS Battery: <10 Hours CPU & RAM: A5X HDD: Up to 64GB SSD Price: $499 and Up
Asus Netbook T101MT Screen: 10.1” Swivel Touch w/ Stylus Wireless: WIFI-n Keyboard: Built-In w/ Touchpad Camera: Yes Platform: MS Windows 7 Pro Battery: <6.5 Hours CPU & RAM: Atom N570, 2GB HDD: 320 5400RPM Price: Approx $780
Asus Eee Pad Slider SL101 Screen: 10.1” Gorilla Multi-Touch Wireless: WIFI-n Keyboard: Built-In Slider Camera: Front & Rear Platform: Android 4.0 Battery: <8 Hours CPU & RAM: Tegra Dual-Core, 1GB HDD: 16GB or 32GB SSD Price: Approx $650
Asus B121-A1 EeePad Screen: 12.1” Gorilla Touch w/ Stylus Wireless: WIFI-n Keyboard: Add-On Camera: Yes Platform: MS Windows 7 Pro Battery: <4.5 Hours CPU & RAM: Intel Core i5, 4GB HDD: 64GB SSD Price: Approx $1,550
HACKERS & CYBER THUGS Who are they? Where are they? Why do they do it? How am I vulnerable? What can I do to protect myself?
HACKERS: WHO ARE THEY? Entrepreneurs Geniuses From all walks of life Programmers Thieves Too smart for their own good, with a computer & internet connection!
HACKERS: WHERE ARE THEY? Next Door College Campuses Living with Mom & Dad Overseas China Russia Third World Countries
HACKERS: WHY DO THEY DO IT? They are bored They consider it a challenge They want to create chaos They want to make money
HACKERS: HOW AM I VULNERABLE? Open Internet Connections No Router or Firewall – Direct Connection Weak Passwords Unsecured WIFI Open Shares Open Ports Especially RDC/Terminal Services! Email Servers
HACKERS: WHAT CAN I DO? Knowing is half the battle! Methods are always changing: Be Vigilant Get a router Set a stronger password Password protect important or sensitive data Get help! Close open ports Setup routers Etc…
VIRUSES & ETDS Most are developed by hackers Anti-Virus programs are good, but can’t always help you It’s fairly easy to protect yourself, as long as you know what to do: BE CAREFUL WHAT YOU CLICK ON! Make sure you can trust websites you are visiting If they are “trying too hard” to get a click – don’t do it Don’t trust official-looking anti-virus warnings Be aware of your AV brand If it’s asking for money, be VERY careful Just because it says “Microsoft, doesn’t mean it’s legit” (or Adobe, etc…) Viruses can’t run unless you give permission or access
ROUTERS & FIREWALLS Any router is better than nothing Almost any router will provide basic protection from most attacks Router VS Firewall Router is usually simply a device for connecting computers and sharing internet and network resources Most routers have at least some firewall functionality built in A firewall is a must more advanced version of a router which actively inspects network and internet traffic for potential problems Routers and Firewalls cannot always protect from viruses Some firewalls can inspect files for malicious content Must always be updated and relevant for current attacks Hackers use viruses (especially Trojans) to get access thru firewalls Most Important – routers/firewalls manage ports and traffic
SERVERS & PASSWORDS Check servers for open ports RDC 3389; Email 110, 25; FTP 21, Telnet 23 Check for unused or unknown Admin accounts Know what all accounts are for – remove others Check all accounts for remote access Double-Lock policy for sensitive programs or resources Set multiple authentication points Use different passwords! Test for vulnerabilities (you may need help with this (continued…)
SERVERS & PASSWORDS (…continued) Establish an organization wide password policy Ensure strong password for anyone who has access to critical or sensitive data Seven characters or more Upper & Lower case letters Numbers & letters Special characters Random as possible Change passwords often
PRIVACY & HIPPAA COMPLIANCE Disclaimer Concerns Patient records on mobile devices Unauthorized access to privileged servers or workstations Be careful of others standing too close – may be able to read sensitive patient data Theft of devices or other hardware with data stored locally Tips Passwords! Or use biometric authentication Consider encrypting Storage Devices Thoroughly destroy residual data on old hardware after upgrades, etc
Your consent to our cookies if you continue to use this website.