Top 6 Technology Threats to Your Long Term Care Organization

1,232 views

Published on

Bill Walter of Gross Mendelsohn's Technology Solutions Group presented this seminar at the Health Facilities of Maryland's annual conference. The presentation is for executive directors, administrators and technology directors of skilled nursing facilities, assisted living facilities, continuing care retirement communities, and other long term healthcare organizations.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,232
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Top 6 Technology Threats to Your Long Term Care Organization

  1. 1. The Top Six Technology Threats to Your Long Term Care Organization Bill Walter, MCP, MCSE
  2. 2. Security “While you may have security without privacy, you can't have privacy without security.” — Jonathan Gossels, president and CEO, SystemExperts
  3. 3. Agenda • Top six threats with steps to mitigate risk • Demonstration • Questions
  4. 4. Threat 1: virtualization • Servers • Desktops • Mobile devices • Hosted or in the Cloud
  5. 5. How to minimize your risk • Patch operating system • Maintain antivirus / antimalware • Patch hardware • Patch underlying system software
  6. 6. Threat 2: Internet gateway • Firewall • Proactive security scanning • Cloud • SaaS • Wireless
  7. 7. How to minimize your risk • Update firmware and operating system • Perform monthly security probe scans • Automatic monitoring with alerting • Secure wireless for authorized use only • Encrypt outgoing data when necessary
  8. 8. Threat 3: remote access • VPN • Remote desktop • VNC • GoToMyPC / LogMeIn
  9. 9. How to minimize your risk • Use VPN combined with two-factor authentication • Use network access control software • Strictly limit use of VNC, GoToMyPC, or LogMeIn to approved users only
  10. 10. Threat 4: mobile devices • Smartphones • PDA • iPad • Mini-laptop
  11. 11. How to minimize your risk • Antivirus / antimalware • Network access control software • Use of remote locking software – Computer LoJack – MobileMe • Ensure underlying system is patched and secured
  12. 12. “I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive…” ―Stephen Hawking
  13. 13. Threat 5: virus and malware • Email • File transfer • Removable devices • Web
  14. 14. How to minimize your risk • Active multiple layer protection • Strict secure file transfer solution • Block unauthorized removable devices • Monitor and limit web access
  15. 15. Threat 6: Users • Training • Accountability • Responsibility
  16. 16. How to minimize your risk • Provide adequate training for each necessary task • Create and maintain acceptable use policy for all employees • Review and document inappropriate use
  17. 17. Demonstration • Group policy – USB – Local files
  18. 18. Resources http://www.hhs.gov/ocr/privacy/ http://www.ftc.gov/bcp/edu/microsites/idtheft/business/resources.html http://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.html http://www.ic3.gov/default.aspx
  19. 19. Questions? William Walter, MCSE | wwalter@gma-cpa.com | 443.610.7413 http://technology-solutions.gma-cpa.com www.facebook.com/GrossMendelsohn www.twitter.com/GrossMendelsohn

×