OKLAHOMA ASSOCIATION FOR HOME CARE & HOSPICE Innovative Technology Symposium 2012.

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

How to Buy…. What do I want to buy? What do I want?… A desktop or a mobile computer (notebook or tablet) What is the purpose? Where am I going to use.
Mobile Infrastructure CSE 390 Fall Mobile device types Pagers – Mostly RIM devices (proprietary OS) – 2-way paging – Use Mobitex and DataTAC wireless.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Mobile computing devices.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Objectives Overview Define an operating system
What device should I get? Apple (OSX or IOS), Android, Chrome, Linux, or Microsoft Phone, tablet, notebook, computer.
Click Here to Begin. Objectives Purchasing a PC can be a difficult process full of complex questions. This Computer Based Training Module will walk you.
Technologies used in The Education System By: McGregor Lippincott, Kathryn Davison and Kirbie Brents.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Tablet Shootout Presented By: Garrett Bahr, Austin Schwai, Travis Tilot.
Unit 1- Recognizing Computers.  Understand the importance of computers  Define computers & computer systems  Classify different types of computers.
VCE IT Theory Slideshows Mobile computing devices By Mark Kelly, Vceit.com iPhone.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
WINDOWS 8.1 MOBILE “Full” Windows in a Tablet Environment.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Technology on Campus Wireless Amenities Your students have access to wireless across UCF’s main campus. Wireless access in dorm rooms is limited and not.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
Unit 1- Recognizing Computers.  Understand the importance of computers  Define computers & computer systems  Classify different types of computers.
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1.1 System Performance Security Module 1 Version 5.
Radford University’s New Student Computer Recommendations.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Explain the purpose of an operating system
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Component 4: Introduction to Information and Computer Science
Specialist communication channel. Sarah-Jane king.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Types of computers Hardware. 8/3/12 Hardware - the tangible, physical parts of the computer which work together to input, process, store and output data.
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
8th Grade Computer Technology Mr. Minger January 2014
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
EMBEDDED OPERATING SYSTEMS. DEFINITION An embedded operating system is a system for embedded computer systems These operating systems are designed to.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Designing a Computer Home Network
The gamut from smartphone to desktop Vic Laurie
Chapter 7. Identifying Assets and Activities to Be Protected
Computer Information Systems
VCE IT Theory Slideshows
System Software EIT, © Author Gay Robertson, 2016.
Classifying & evaluating computers
My Perfect Computer Your Name
CYBERSAFETY & Personal information
Presentation transcript:

OKLAHOMA ASSOCIATION FOR HOME CARE & HOSPICE Innovative Technology Symposium 2012

HOME HEALTH TECH SOLUTIONS AND SECURITY Presented By: James B Eggert

MOBILE TECHNOLOGIES Welcome To Home Health Tech

MOBILE DEVICES  Laptop/Notebook  Netbook  PDA  Smart Phone and/or iPhone  Tablet PC

TABLET PC: NOTABLE SPECS  Screen Size  Touch, Stylus, or Both  WIFI &/or Cellular  Keyboard Type  Camera  OS Platform  Durability  Battery  Performance Specs

TABLET PC: OPERATING SYSTEMS  Microsoft Windows  Apple iOS  Android  Linux (very rare)

TABLET PC: PERFORMANCE SPECS  Processor  Memory (RAM)  Storage (Hard Drive)  Size (almost irrelevant)  Speed o 5400 RPM o 7200 RPM  Solid State

TABLET PC: CONNECTIVITY  Hard Wired Ethernet (use when necessary and available)  WIFI  WIFI controller built-in to almost all mobile devices  Requires close proximity to a WIFI router or access point  Available in many restaurants, hotels, public places, and sometimes private homes  May require a password or key to access  Cellular Broadband  GSM, 3G, 4G/LTE, and others  Requires cellular broadband receiver  Some mobile devices have a built-in controller  If not, you may be able to use mobile phone as hotspot or tethered receiver  Requires paid cellular plan with local carrier

TABLET PC: CONNECTIVITY PLATFORMS  Field Mode & Sync with Server  No WIFI or cellular required  No worries about loss of signal or connectivity  Need to re-attach to home network regularly  Inconvenient & cumbersome  Compatible platforms required  Data corruption susceptible  Live/Real-Time Always-On Connection  Requires constant and reliable source of WIFI and/or cellular connection  Risk of lost data or slow response (continued…)

TABLET PC: CONNECTIVITY PLATFORMS  Live/Real-Time Always-On Connection (…continued)  Data always in-sync and up-to-date  Compatible platforms required  Efficient and productive (when good signal is available)  Live Virtual or Remote Desktop Connection  Requires constant and reliable source of WIFI and/or cellular connection  Fast response and no risk of data loss or corruption  Data always in-sync and up-to-date  Efficient and productive (when signal is good)  Various and multiple platforms work together

TABLETS TO REVIEW  iPad  Asus Netbook T101MT Swivel  Asus Eee Pad Slider SL101  Asus B121-A1 EeePad  Samsung Galaxy Tab  Samsung Series 7 Slate PC  Panasonic ToughPad A1  Panasonic ToughBook H2

The New iPad Screen: 9.7” Touch Extreme Resolution Wireless: WIFI-n & 4G LTE Cellular Keyboard: Add-On Camera: Yes Platform: Mac iOS Battery: <10 Hours CPU & RAM: A5X HDD: Up to 64GB SSD Price: $499 and Up

Asus Netbook T101MT Screen: 10.1” Swivel Touch w/ Stylus Wireless: WIFI-n Keyboard: Built-In w/ Touchpad Camera: Yes Platform: MS Windows 7 Pro Battery: <6.5 Hours CPU & RAM: Atom N570, 2GB HDD: RPM Price: Approx $780

Asus Eee Pad Slider SL101 Screen: 10.1” Gorilla Multi-Touch Wireless: WIFI-n Keyboard: Built-In Slider Camera: Front & Rear Platform: Android 4.0 Battery: <8 Hours CPU & RAM: Tegra Dual-Core, 1GB HDD: 16GB or 32GB SSD Price: Approx $650

Asus B121-A1 EeePad Screen: 12.1” Gorilla Touch w/ Stylus Wireless: WIFI-n Keyboard: Add-On Camera: Yes Platform: MS Windows 7 Pro Battery: <4.5 Hours CPU & RAM: Intel Core i5, 4GB HDD: 64GB SSD Price: Approx $1,550

Samsung Galaxy Tab Screen: 7.7” Multi-Touch Wireless: 4G LTE Keyboard: Add-On Camera: Front & Rear Platform: Android 3.2 Honeycomb Battery: <13 Hours CPU & RAM: 1.4GHz Dual-Core, 16GB HDD: 32GB + SD Card Price: Approx $550

Samsung Series 7 Slate PC Screen: 11.6” Multi-Touch w/ Stylus Wireless: WIFI-n & 3G Keyboard: Add-On Camera: Front & Rear Platform: MS Windows 8 Battery: (no specs offered !?!) CPU & RAM: Intel Core i5, 4GB HDD: 128GB SSD Price: Approx $1,350

Panasonic ToughPad A1 Screen: 10.1” Multi-Touch w/ Stylus Wireless: WIFI-n & 4G LTE Keyboard: On-Screen Only Camera: Front & Rear Platform: Android 3.2 Battery: Long-Life Li-Ion CPU & RAM: 1.2GHz Dual-Core, 1GB HDD: 16GB Flash Very-High Durability Price: Approx $2,100

Panasonic Toughbook H2 Screen: 10.1” Dual-Touch w/ Stylus Wireless: WIFI-n & 3G or 4G LTE Keyboard: On-Screen Only Camera: Yes Platform: MS Windows 7 Pro Battery: Long-Life Dual Hot Swap CPU & RAM: Intel Core i5, 4GB HDD: 320GB 7200 or 128GB SSD Extreme Durability Price: Approx $3,900

OTHER BRANDS TO CHECK OUT  Acer  Dell  Fujitsu  Lenovo  Toshiba

NETWORK SECURITY Thanks for attending! Up Next:

NETWORK SECURITY TOPICS  Hackers & Other Cyber Thugs  Viruses & ETDs  Routers & Firewalls  Servers & Passwords  Privacy & HIPPAA Compliance Tips

HACKERS & CYBER THUGS  Who are they?  Where are they?  Why do they do it?  How am I vulnerable?  What can I do to protect myself?

HACKERS: WHO ARE THEY?  Entrepreneurs  Geniuses  From all walks of life  Programmers  Thieves  Too smart for their own good, with a computer & internet connection!

HACKERS: WHERE ARE THEY?  Next Door  College Campuses  Living with Mom & Dad  Overseas  China  Russia  Third World Countries

HACKERS: WHY DO THEY DO IT?  They are bored  They consider it a challenge  They want to create chaos  They want to make money

HACKERS: HOW AM I VULNERABLE?  Open Internet Connections  No Router or Firewall – Direct Connection  Weak Passwords  Unsecured WIFI  Open Shares  Open Ports  Especially RDC/Terminal Services!  Servers

HACKERS: WHAT CAN I DO?  Knowing is half the battle!  Methods are always changing: Be Vigilant  Get a router  Set a stronger password  Password protect important or sensitive data  Get help!  Close open ports  Setup routers  Etc…

VIRUSES & ETDS  Most are developed by hackers  Anti-Virus programs are good, but can’t always help you  It’s fairly easy to protect yourself, as long as you know what to do:  BE CAREFUL WHAT YOU CLICK ON!  Make sure you can trust websites you are visiting  If they are “trying too hard” to get a click – don’t do it  Don’t trust official-looking anti-virus warnings  Be aware of your AV brand  If it’s asking for money, be VERY careful  Just because it says “Microsoft, doesn’t mean it’s legit” (or Adobe, etc…)  Viruses can’t run unless you give permission or access

ROUTERS & FIREWALLS  Any router is better than nothing  Almost any router will provide basic protection from most attacks  Router VS Firewall  Router is usually simply a device for connecting computers and sharing internet and network resources  Most routers have at least some firewall functionality built in  A firewall is a must more advanced version of a router which actively inspects network and internet traffic for potential problems  Routers and Firewalls cannot always protect from viruses  Some firewalls can inspect files for malicious content  Must always be updated and relevant for current attacks  Hackers use viruses (especially Trojans) to get access thru firewalls  Most Important – routers/firewalls manage ports and traffic

SERVERS & PASSWORDS  Check servers for open ports  RDC 3389; 110, 25; FTP 21, Telnet 23  Check for unused or unknown Admin accounts  Know what all accounts are for – remove others  Check all accounts for remote access  Double-Lock policy for sensitive programs or resources  Set multiple authentication points  Use different passwords!  Test for vulnerabilities (you may need help with this (continued…)

SERVERS & PASSWORDS (…continued)  Establish an organization wide password policy  Ensure strong password for anyone who has access to critical or sensitive data  Seven characters or more  Upper & Lower case letters  Numbers & letters  Special characters  Random as possible  Change passwords often

PRIVACY & HIPPAA COMPLIANCE  Disclaimer  Concerns  Patient records on mobile devices  Unauthorized access to privileged servers or workstations  Be careful of others standing too close – may be able to read sensitive patient data  Theft of devices or other hardware with data stored locally  Tips  Passwords! Or use biometric authentication  Consider encrypting Storage Devices  Thoroughly destroy residual data on old hardware after upgrades, etc

THE END Thank you for attending!