Secure Health Online 4 June 2008. Bendigo Community Telco Why Bendigo Community Telco? A public company owned by 400 locals A vehicle for collaboration.

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

A Flexible Cloud-Computing Platform Focus on solving business problems
Hosted Revolution Ltd Hosted Exchange October 2009 V2.01.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
PLEXIA Electronic Medical System
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Introduction IT Department at CEU Contribution to carry out CEU’s mission with appropriate: -Information technology tools and services -Hardware and software.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
Privacy in a Public World ISACA North Alabama Chapter March 11, 2008.
Your storage on the ground; Your files in the cloud.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Internet.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
Cloud Computing Definitions Cloud The set of hardware, networks, storage, services and interfaces that combine to deliver computing as a service Cloud.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security for Small & Medium Business Week 6
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
{ Microsoft OneNote Organizing Your Thoughts in the Cloud Presented by: Matthew Baker (321)
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Security at NCAR David Mitchell February 20th, 2007.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Your community -- online! Chebucto Community Net Serving the community since 1994!
MEDIU Learning for HE Ahmad Nimer | Project Manager.
Introducing HingX now with Capacity Development Network.
Windows 2000 Certificate Authority By Saunders Roesser.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Operational Circular No 5 Use of CERN Computing Facilities.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
{ INTERNET  A GLOBAL SYSTEM OF INTERCONNECTED COMPUTERS  A NETWORK OF NETWORKS.  A PART OF EVERYDAY LIFE  VAST ARRAY OF INFORMATION RESOURCES AND SERVICES.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Using technology to teach? We provide assistance and classroom support.
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Introduction to Networking. What is a Network? Discuss in groups.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Simplified Information Services. Data Shepherd IT portfolio Business solutions Online backup Hosted exchange Mail secureFixerCloudiusHosting Remote Desktop.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Unit 3 Virtualization.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
3.1 Types of Servers.
[Company Name] Veeam Offerings
TYPES OF SERVER. TYPES OF SERVER What is a server.
Hotmail Customer Support Number Toll Free Number.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
An Introduction to Cloud Computing
Internet Engineering Course
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Revision PowerPoint By Nicole Davidson.
Presentation transcript:

Secure Health Online 4 June 2008

Bendigo Community Telco Why Bendigo Community Telco? A public company owned by 400 locals A vehicle for collaboration Part of a national buying group An important mission is the retention of capital (human and financial)

Secure Health Online Goals Users should have access to secure services, such as , storage and health specific applications Services should be available securely both inside and outside the Health Network A sustainable commercial model must be developed

Practice Services Data centre services such as offsite storage World Class Mail Filtering Easy VPN access into the secure environment Hosted Application Services Research & Development platform

How it Works - Example To illustrate the internal workings of the secure network, consider the example of remotely accessing storage

What the user sees

What actually happens

Secure Health Online Public Access Users can access their practice network including , medical records and files from a Secure Portal Secured by SSL VPN Technology –Access anywhere (using a web browser) –All traffic is encrypted using Public Key Infrastructure, which is widely used throughout the Interent –Very resistant to viruses, worms, etc –Scalable –No data on the local machine

Public Portal

Personalised Home Page Storage Practice Computer/Server Web SPAM Quarantine

Portal ► Storage Microsoft Word & Excel files Sound files

What actually happens

Portal ►Practice Computer

What actually happens

The future Other Health providers will be encouraged to join the Secure health Online network Immediate plans include Bendigo Health Care Group and Loddon MalleeHealth Alliance A research and development area has been set aside for external suppliers A HL7 compliant application is being built to allow allied health professionals to send electronic information

The future

Bendigo Business Continuity Centre (BCC) The Bendigo Business Continuity Centre (BCC) is a purpose built facility to the highest standards. Bendigo Community Telco’s objective is to operate the BCC according to the requirements of AS