The Top Six Technology
Threats to Your Long
Term Care Organization
Bill Walter, MCP, MCSE
Security
“While you may have security without
privacy, you can't have privacy without
security.”
— Jonathan Gossels, presi...
Agenda
• Top six threats with steps to mitigate risk
• Demonstration
• Questions
Threat 1: virtualization
• Servers
• Desktops
• Mobile devices
• Hosted or in the Cloud
How to minimize your risk
• Patch operating system
• Maintain antivirus / antimalware
• Patch hardware
• Patch underlying ...
Threat 2: Internet gateway
• Firewall
• Proactive security scanning
• Cloud
• SaaS
• Wireless
How to minimize your risk
• Update firmware and operating system
• Perform monthly security probe scans
• Automatic monito...
Threat 3: remote access
• VPN
• Remote desktop
• VNC
• GoToMyPC / LogMeIn
How to minimize your risk
• Use VPN combined with two-factor
authentication
• Use network access control software
• Strict...
Threat 4: mobile devices
• Smartphones
• PDA
• iPad
• Mini-laptop
How to minimize your risk
• Antivirus / antimalware
• Network access control software
• Use of remote locking software
– C...
“I think computer viruses
should count as life. I think
it says something about
human nature that the
only form of life we...
Threat 5: virus and malware
• Email
• File transfer
• Removable devices
• Web
How to minimize your risk
• Active multiple layer protection
• Strict secure file transfer solution
• Block unauthorized r...
Threat 6: Users
• Training
• Accountability
• Responsibility
How to minimize your risk
• Provide adequate training for each
necessary task
• Create and maintain acceptable use policy
...
Demonstration
• Group policy
– USB
– Local files
Resources
http://www.hhs.gov/ocr/privacy/
http://www.ftc.gov/bcp/edu/microsites/idtheft/business/resources.html
http://www...
Questions?
William Walter, MCSE | wwalter@gma-cpa.com | 443.610.7413
http://technology-solutions.gma-cpa.com
www.facebook....
Upcoming SlideShare
Loading in …5
×

Top 6 Technology Threats to Your Long Term Care Organization

1,225 views

Published on

Bill Walter of Gross Mendelsohn's Technology Solutions Group presented this seminar at the Health Facilities of Maryland's annual conference. The presentation is for executive directors, administrators and technology directors of skilled nursing facilities, assisted living facilities, continuing care retirement communities, and other long term healthcare organizations.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,225
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Top 6 Technology Threats to Your Long Term Care Organization

  1. 1. The Top Six Technology Threats to Your Long Term Care Organization Bill Walter, MCP, MCSE
  2. 2. Security “While you may have security without privacy, you can't have privacy without security.” — Jonathan Gossels, president and CEO, SystemExperts
  3. 3. Agenda • Top six threats with steps to mitigate risk • Demonstration • Questions
  4. 4. Threat 1: virtualization • Servers • Desktops • Mobile devices • Hosted or in the Cloud
  5. 5. How to minimize your risk • Patch operating system • Maintain antivirus / antimalware • Patch hardware • Patch underlying system software
  6. 6. Threat 2: Internet gateway • Firewall • Proactive security scanning • Cloud • SaaS • Wireless
  7. 7. How to minimize your risk • Update firmware and operating system • Perform monthly security probe scans • Automatic monitoring with alerting • Secure wireless for authorized use only • Encrypt outgoing data when necessary
  8. 8. Threat 3: remote access • VPN • Remote desktop • VNC • GoToMyPC / LogMeIn
  9. 9. How to minimize your risk • Use VPN combined with two-factor authentication • Use network access control software • Strictly limit use of VNC, GoToMyPC, or LogMeIn to approved users only
  10. 10. Threat 4: mobile devices • Smartphones • PDA • iPad • Mini-laptop
  11. 11. How to minimize your risk • Antivirus / antimalware • Network access control software • Use of remote locking software – Computer LoJack – MobileMe • Ensure underlying system is patched and secured
  12. 12. “I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive…” ―Stephen Hawking
  13. 13. Threat 5: virus and malware • Email • File transfer • Removable devices • Web
  14. 14. How to minimize your risk • Active multiple layer protection • Strict secure file transfer solution • Block unauthorized removable devices • Monitor and limit web access
  15. 15. Threat 6: Users • Training • Accountability • Responsibility
  16. 16. How to minimize your risk • Provide adequate training for each necessary task • Create and maintain acceptable use policy for all employees • Review and document inappropriate use
  17. 17. Demonstration • Group policy – USB – Local files
  18. 18. Resources http://www.hhs.gov/ocr/privacy/ http://www.ftc.gov/bcp/edu/microsites/idtheft/business/resources.html http://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.html http://www.ic3.gov/default.aspx
  19. 19. Questions? William Walter, MCSE | wwalter@gma-cpa.com | 443.610.7413 http://technology-solutions.gma-cpa.com www.facebook.com/GrossMendelsohn www.twitter.com/GrossMendelsohn

×