Your SlideShare is downloading. ×
Top 6 technology threats to your long term care organization HFAM 2011
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Top 6 technology threats to your long term care organization HFAM 2011

929

Published on

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
929
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The top six technologythreats to your long-termcare organizationand how to mitigate them Bright ideas. Smart solutions. www.technology-solutions.gma-cpa.com
  • 2. Security“While you may have security withoutprivacy, you cant have privacy withoutsecurity.”— Jonathan Gossels, president and CEO, SystemExperts
  • 3. Agenda• Top six threats with steps to mitigate risk• Demonstration• Questions
  • 4. Threat 1: virtualization• Servers• Desktops• Mobile devices• Hosted or in the Cloud
  • 5. How to minimize your risk• Patch operating system• Maintain antivirus / antimalware• Patch hardware• Patch underlying system software
  • 6. Threat 2: Internet gateway• Firewall• Proactive security scanning• Cloud• SaaS• Wireless
  • 7. How to minimize your risk• Update firmware and operating system• Perform monthly security probe scans• Automatic monitoring with alerting• Secure wireless for authorized use only• Encrypt outgoing data when necessary
  • 8. Threat 3: remote access• VPN• Remote desktop• VNC• GoToMyPC / LogMeIn
  • 9. How to minimize your risk• Use VPN combined with two-factor authentication• Use network access control software• Strictly limit use of VNC, GoToMyPC, or LogMeIn to approved users only
  • 10. Threat 4: mobile devices• Smartphones• PDA• iPad• Mini-laptop
  • 11. How to minimize your risk• Antivirus / antimalware• Network access control software• Use of remote locking software – Computer LoJack – MobileMe• Ensure underlying system is patched and secured
  • 12. “I think computer virusesshould count as life. I thinkit says something abouthuman nature that theonly form of life we havecreated so far is purelydestructive…”―Stephen Hawking
  • 13. Threat 5: virus and malware• Email• File transfer• Removable devices• Web
  • 14. How to minimize your risk• Active multiple layer protection• Strict secure file transfer solution• Block unauthorized removable devices• Monitor and limit web access
  • 15. Threat 6: Users• Training• Accountability• Responsibility
  • 16. How to minimize your risk• Provide adequate training for each necessary task• Create and maintain acceptable use policy for all employees• Review and document inappropriate use
  • 17. Demonstration• Group policy – USB – Local files
  • 18. Resourceshttp://www.hhs.gov/ocr/privacy/http://www.ftc.gov/bcp/edu/microsites/idtheft/business/resources.htmlhttp://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.htmlhttp://www.ic3.gov/default.aspx
  • 19. Questions?William Walter, MCSE | wwalter@gma-cpa.com | 443.610.7413 http://technology-solutions.gma-cpa.com www.facebook.com/GrossMendelsohn www.twitter.com/GrossMendelsohn

×