SlideShare a Scribd company logo
RICKS
   ’S T LS
VAL TOO
   &



      Mission Impossible
       Protect Your Data from CyberSpace, HIPAA
                  Breaches and GVT’s*

                      (*Garden Variety Thieves)

               presented by Valerie R. Houghton, RN, MFT, JD
                           September 30, 2011
RICKS
   ’S T LS
 AL OO
V T
   &




 What Kinds of Tools Do We
          Need?              2
RICKS
   ’S T LS
 AL OO
V T
   &




 What Kinds of Tools Do We
          Need?              2
RICKS
   ’S T LS
VAL TOO
   &




   Does This Sound Familiar?
               Nahhhhhhh......
                                 3
RICKS
   ’S T LS
VAL TOO
   &




   Does This Sound Familiar?
               Nahhhhhhh......
                                 3
RICKS
   ’S T LS
VAL TOO
   &




Encryption:



               4
RICKS
   ’S T LS
VAL TOO
   &




Encryption:       Email
               Data Packets
                   Files
                  Discs


                              4
RICKS
   ’S T LS
VAL TOO
   &


    Comparison of Platforms:




                               5
RICKS
   ’S T LS
VAL TOO
   &


    Comparison of Platforms:
  * Most Programs are Designed for PC Users
   *Most Are Designed for Large Healthcare
     Organizations, Banks & Law Firms...

               $$ Chuuuh - Chingg $$
                                              5
RICKS
   ’S T LS
VAL TOO
   &




          There Are Less Expensive
                Alternatives!
       ... After Reviewing Dozens of
   Articles, Sites, Blogs & Listserves and
   Chats w/Enthusiastic Sales Persons....    6
RICKS
   ’S T LS
VAL TOO
   &




        So, What Are the Best
             Programs?


                                7
RICKS
   ’S T LS
VAL TOO
   &




        So, What Are the Best
             Programs?
          In the Interest of Freedom of
           Choice...May We Present...
                                          7
RICKS
   ’S T LS
VAL TOO
   &




               8
RICKS
   ’S T LS
VAL TOO
   &


    Primary “Gotta Have These:”
                   *1Password
                    *Evernote
                     *Sophos
                   *SpiderOak
                    *Dropbox

                                  8
RICKS
   ’S T LS
VAL TOO
   &




Start by Saving All Client Data in
Encrypted Form in Files on Your
            Computer                 9
RICKS
   ’S T LS
VAL TOO
   &



           And for the PC Users...
                                 how to encrypt files on pc - YouTube                                                                                                                      8/28/11 5:23 PM




                                                         how to encrypt files on pc                                                        Search       Browse      Movies   Upload   valerierhoughton




                 Check Out       Search results for how to encrypt files on pc
                                 About 276 results

                                 Filter


                                                             Intel Anti-Theft Security
                                                             Intel® Powered Laptops Can Disable
                                                             If Lost or Stolen! Learn More Now.
                                                                                                                                                                                      Sort by: Relevance




                 YouTube...
                                                             by channelintel | 20,263 views
                                                      2:31
                                                                                                                                                  Promoted Videos

                                                             Cheap GPU Upgrades! How To Encrypt A File Before You Send It, Sennheiser ...
                                                             SongFacts.com: It's Like IMDB for Music! Our favorite FREE encryption software runs on any OS.
                                                             Transfer Mac Files to a PC FAST. HTPC Tuner Cards ...
                                                             by TEKHD | 2 months ago | 3,979 views
                                                     30:33
                                                              HD


                                                             How To Encrypt Files (Windows)
                                                             This is a video on how to encrypt files you wish to protect. The download link is:
                                                             www.brothersoft.com Please comment, rate, and subscribe ...
                                                             by ebildude123 | 3 months ago | 51 views
                                                      2:27


                                                             Encrypt files and folders in windows 7 and vista




                 3 Pages of
                                                             how to encrypt your files and folders on windows 7 and vista so only you should be able to see
                                                             them, that means if you lose your computer people ...
                                                             by yankiadler | 1 year ago | 5,481 views
                                                      2:01
                                                              HD


                                                             Tutorial #60 ( how to encrypt files on windows)
                                                             Hey guys geektechtutorial here and in this tutorial I show you how to encrypt files on windows.
                                                             Conceal download Link:www.dataconceal.com/download ...
                                                             by geektechtut1archive | 5 months ago | 31 views
                                                      4:39
                                                              HD




               Results in 0.02
                                                             Introduction to Video Padlock - How to Encrypt your files easily and securely
                                                             www.applian.com Watch how easy it is to encrypt any file on your computer. Great if you share
                                                             your PC with anyone.
                                                             by ApplianTechnologies | 1 year ago | 4,170 views
                                                      2:11
                                                              HD


                                                             How to encrypt a file MAC
                                                             Need help with another mac related problem, comment and I will make a video on it. In case you
                                                             had trouble here are the steps: 1. Load Disk ...
                                                             by legolego123123 | 1 year ago | 954 views




                  Seconds
                                                      2:55


                                                             How to Encrypt (Password-Protect) Your Files
                                                             This video will show you how to hide and encrypt important or private files using a free program
                                                             called TrueCrypt - www.truecrypt.org Be sure to ...
                                                             by italdj | 3 years ago | 7,384 views
                                                      3:14


                                                             Windows Encryption Software Instantly Encrypts Files And Fo
                                                             windowsencryption.org see how this software instantly encrypts files and folders on your
                                                             Windows XP or Vista PC. Automatic Windows encryption ...
                                                             by transom284 | 2 years ago | 400 views
                                                      2:49




                                                                                                                                                                                                               10
                                                             How to encrypt files in MacOS X tutorial.
                                                             This tutorial shows you how to use encrypted disk images in MacOS X to transfer files securely,
                                                             and to store files on your mac in a secure manner ...
                                                             by nenewsjunkie | 2 years ago | 129 views
                                                      8:20




                                 http://www.youtube.com/results?search_query=how+to+encrypt+files+on+pc&aq=f                                                                                     Page 1 of 3
RICKS
   ’S T LS
VAL TOO
   &




               11
RICKS
   ’S T LS
VAL TOO
   &




   1Password: Can sync across
       devices- encrypted & can
         generate passwords
     No Storage of Non-Encrypted Material
      & the Master Password is Generated
       Locally & Not Stored in the Cloud    11
RICKS
   ’S T LS
VAL TOO
   &


 Dropbox: is not secure, but if you put encrypted
 data into it- it’s ok & the cross-device syncing is perfect!

   SpiderOak: is secure because the password is
       never stored on their server & all encrypted.

 Evernote: is not secure. Fantastic program for
 saving articles, web clippings,with file sharing and ability
 to sync with all of your devices.

                                                                12
RICKS
   ’S T LS
VAL TOO
   &
                           Mobile phone hipaa security - YouTube                                                                                                                                        8/28/11 6:30 PM




                                                  Mobile phone hipaa security                                                           Search      Browse   Movies     Upload                    valerierhoughton


                           Search results for Mobile phone hipaa security                                                                                                                        Sort by: Relevance

                           About 30 results

                           Filter

                                                                                                                                                                                                           Featured Videos
                                                      Security Breach is Dangerous for Medical
                                                      Medical practices are especially vulnerable to security and data breach because of the volume of                                      Nurses Fired Over Cell
                                                      patient records they store. HIPAA does not ...
                                                                                                                                                                                            Phone Photos Of Patient
                                                      by APSAbusinesssecurity | 8 months ago | 59 views
                                                                                                                                                                                            Nurses, accused of
                                               7:48
                                                                                                                                                                                            photographing an X-ray of
                                                                                                                                                                                  1:14      patient with a stuck &quo...
                                                      Nurses Fired Over Cell Phone Photos Of Patient
                                                                                                                                                               by wisn | 7,051 views
                                                      Nurses, accused of photographing an X-ray of patient with a stuck "sex toy" in the rectum and
                                                      posting the pictures on the Internet, have been fired.
                                                      by wisn | 2 years ago | 7,051 views
                                               1:14


                                                      Exposing The AirG.com scam ! The program is a scam of stolen pictures ...
                                                      pictures off people's cell phones ! An identity theft site that invades your privacy, financial
                                                      informatio and your hipaa medical information ...
                                                      by IDoNotUseFlourToCook | 2 weeks ago | 20 views
                                               0:24


                                                      SecurCopper HIPAA Compliant Medical Text Message System
                                                      As the possibilities for electronic communication continue to expand with great speed, use of the
                                                      technology by hospital employees and physicians ...
                                                      by burtleed1 | 4 days ago | 15 views
                                               0:25


                                                      Protecting your cell phone                                                                                                       Advertisement
                                                      Learn how to protect yourself from cell phone spyware. www.tinyurl.com
                                                      by 13WTHR | 2 years ago | 76,592 views

                                               3:44


                                                      5 tips for cell phone security
                                                      www.PromotionsAndDiscounts.com 5 tips for cell phone security 1. Know Your Phone Keep your
                                                      phone number and the SIM card number written. You ...
                                                      by promotionsdiscounts | 7 months ago | 399 views
                                               1:30
                                                       HD


                                                      May 2010: Mobile Phone Security
                                                      Chief Research Officer Mikko Hyppönen and Security Advisor Sean Sullivan discuss mobile
                                                      phone security topics from the first 4 months of 2010.
                                                      by fslabs | 1 year ago | 2,470 views
                                               8:51


                                                      Google I/O 2011: Compliance and Security in the Cloud
                                                      Michael Manoochehri Learn what you need to know to succeed as a Google Apps VAR or
                                                      customer in the areas of identity management, data migration ...
                                                      by GoogleDevelopers | 3 months ago | 1,747 views
                                              50:26
                                                       HD   CC


                                                      Send secure SMS messages with CellTrust SecureSMS Appliance
                                                      secure sms hipaa fips sarbox compliant track return receipt tutorial mobile applications gateway
                                                      text message messaging security banking ...
                                                      by celltrust | 10 months ago | 428 views
                                               1:20
                                                       HD


                                                      Care Notes Online
                                                      " "medical record" "home health" "home health notes" HIPAA "smart phone" "cell phone"
                                                      "browser based" "browser-based care notes" "home ...
                                                      by marilyngard1 | 1 month ago | 25 views
                                               4:56
                                                       HD


                                                      Famhost - JaRay - Linkwriter - GPS Window Login Process


                           http://www.youtube.com/results?search_query=Mobile+phone+hipaa+security&aq=f                                                                                                         Page 1 of 3




    TigerText Pro: HIPAA Compliant Text
    Messaging for iPhones, Androids and
                Blackberries
  PLUS: 3 pages of resources from YouTube
                                                                                                                                                                                                                              13
RICKS
   ’S T LS
VAL TOO
   &




  For Computer Security: Sophos     is the Winner- Swept
          the Competition in Europe this Month
   For Secure Correspondence with Clients: The Winner is
               Privacy Data Systems                        14

More Related Content

Similar to Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
Itech 1005
Itech 1005Itech 1005
Itech 1005
Christina Ramirez
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
Risk Crew
 
AUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptxAUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptx
DJ Nag
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
wilkmjw
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Nicholas Davis
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
IIJ
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
amiable_indian
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Vikas Jain
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
Rino Landa
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
Gabriella Davis
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
YashSomalkar
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
TGodfrey
 
Think Blockchain Series
Think Blockchain SeriesThink Blockchain Series
Think Blockchain Series
ManojPappu
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
Derek King
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
xererenhosdominaram
 

Similar to Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations (20)

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Itech 1005
Itech 1005Itech 1005
Itech 1005
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
AUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptxAUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptx
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Think Blockchain Series
Think Blockchain SeriesThink Blockchain Series
Think Blockchain Series
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
 

More from Valerie Houghton

Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short VersionValerie Houghton
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short VersionValerie Houghton
 
Parental Contact Resistance
Parental Contact ResistanceParental Contact Resistance
Parental Contact ResistanceValerie Houghton
 
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Valerie Houghton
 
9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.ComValerie Houghton
 
The Clients Virtual File
The Clients Virtual FileThe Clients Virtual File
The Clients Virtual File
Valerie Houghton
 

More from Valerie Houghton (6)

Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
Parental Contact Resistance
Parental Contact ResistanceParental Contact Resistance
Parental Contact Resistance
 
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
 
9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com
 
The Clients Virtual File
The Clients Virtual FileThe Clients Virtual File
The Clients Virtual File
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations

  • 1. RICKS ’S T LS VAL TOO & Mission Impossible Protect Your Data from CyberSpace, HIPAA Breaches and GVT’s* (*Garden Variety Thieves) presented by Valerie R. Houghton, RN, MFT, JD September 30, 2011
  • 2. RICKS ’S T LS AL OO V T & What Kinds of Tools Do We Need? 2
  • 3. RICKS ’S T LS AL OO V T & What Kinds of Tools Do We Need? 2
  • 4. RICKS ’S T LS VAL TOO & Does This Sound Familiar? Nahhhhhhh...... 3
  • 5. RICKS ’S T LS VAL TOO & Does This Sound Familiar? Nahhhhhhh...... 3
  • 6. RICKS ’S T LS VAL TOO & Encryption: 4
  • 7. RICKS ’S T LS VAL TOO & Encryption: Email Data Packets Files Discs 4
  • 8. RICKS ’S T LS VAL TOO & Comparison of Platforms: 5
  • 9. RICKS ’S T LS VAL TOO & Comparison of Platforms: * Most Programs are Designed for PC Users *Most Are Designed for Large Healthcare Organizations, Banks & Law Firms... $$ Chuuuh - Chingg $$ 5
  • 10. RICKS ’S T LS VAL TOO & There Are Less Expensive Alternatives! ... After Reviewing Dozens of Articles, Sites, Blogs & Listserves and Chats w/Enthusiastic Sales Persons.... 6
  • 11. RICKS ’S T LS VAL TOO & So, What Are the Best Programs? 7
  • 12. RICKS ’S T LS VAL TOO & So, What Are the Best Programs? In the Interest of Freedom of Choice...May We Present... 7
  • 13. RICKS ’S T LS VAL TOO & 8
  • 14. RICKS ’S T LS VAL TOO & Primary “Gotta Have These:” *1Password *Evernote *Sophos *SpiderOak *Dropbox 8
  • 15. RICKS ’S T LS VAL TOO & Start by Saving All Client Data in Encrypted Form in Files on Your Computer 9
  • 16. RICKS ’S T LS VAL TOO & And for the PC Users... how to encrypt files on pc - YouTube 8/28/11 5:23 PM how to encrypt files on pc Search Browse Movies Upload valerierhoughton Check Out Search results for how to encrypt files on pc About 276 results Filter Intel Anti-Theft Security Intel® Powered Laptops Can Disable If Lost or Stolen! Learn More Now. Sort by: Relevance YouTube... by channelintel | 20,263 views 2:31 Promoted Videos Cheap GPU Upgrades! How To Encrypt A File Before You Send It, Sennheiser ... SongFacts.com: It's Like IMDB for Music! Our favorite FREE encryption software runs on any OS. Transfer Mac Files to a PC FAST. HTPC Tuner Cards ... by TEKHD | 2 months ago | 3,979 views 30:33 HD How To Encrypt Files (Windows) This is a video on how to encrypt files you wish to protect. The download link is: www.brothersoft.com Please comment, rate, and subscribe ... by ebildude123 | 3 months ago | 51 views 2:27 Encrypt files and folders in windows 7 and vista 3 Pages of how to encrypt your files and folders on windows 7 and vista so only you should be able to see them, that means if you lose your computer people ... by yankiadler | 1 year ago | 5,481 views 2:01 HD Tutorial #60 ( how to encrypt files on windows) Hey guys geektechtutorial here and in this tutorial I show you how to encrypt files on windows. Conceal download Link:www.dataconceal.com/download ... by geektechtut1archive | 5 months ago | 31 views 4:39 HD Results in 0.02 Introduction to Video Padlock - How to Encrypt your files easily and securely www.applian.com Watch how easy it is to encrypt any file on your computer. Great if you share your PC with anyone. by ApplianTechnologies | 1 year ago | 4,170 views 2:11 HD How to encrypt a file MAC Need help with another mac related problem, comment and I will make a video on it. In case you had trouble here are the steps: 1. Load Disk ... by legolego123123 | 1 year ago | 954 views Seconds 2:55 How to Encrypt (Password-Protect) Your Files This video will show you how to hide and encrypt important or private files using a free program called TrueCrypt - www.truecrypt.org Be sure to ... by italdj | 3 years ago | 7,384 views 3:14 Windows Encryption Software Instantly Encrypts Files And Fo windowsencryption.org see how this software instantly encrypts files and folders on your Windows XP or Vista PC. Automatic Windows encryption ... by transom284 | 2 years ago | 400 views 2:49 10 How to encrypt files in MacOS X tutorial. This tutorial shows you how to use encrypted disk images in MacOS X to transfer files securely, and to store files on your mac in a secure manner ... by nenewsjunkie | 2 years ago | 129 views 8:20 http://www.youtube.com/results?search_query=how+to+encrypt+files+on+pc&aq=f Page 1 of 3
  • 17. RICKS ’S T LS VAL TOO & 11
  • 18. RICKS ’S T LS VAL TOO & 1Password: Can sync across devices- encrypted & can generate passwords No Storage of Non-Encrypted Material & the Master Password is Generated Locally & Not Stored in the Cloud 11
  • 19. RICKS ’S T LS VAL TOO & Dropbox: is not secure, but if you put encrypted data into it- it’s ok & the cross-device syncing is perfect! SpiderOak: is secure because the password is never stored on their server & all encrypted. Evernote: is not secure. Fantastic program for saving articles, web clippings,with file sharing and ability to sync with all of your devices. 12
  • 20. RICKS ’S T LS VAL TOO & Mobile phone hipaa security - YouTube 8/28/11 6:30 PM Mobile phone hipaa security Search Browse Movies Upload valerierhoughton Search results for Mobile phone hipaa security Sort by: Relevance About 30 results Filter Featured Videos Security Breach is Dangerous for Medical Medical practices are especially vulnerable to security and data breach because of the volume of Nurses Fired Over Cell patient records they store. HIPAA does not ... Phone Photos Of Patient by APSAbusinesssecurity | 8 months ago | 59 views Nurses, accused of 7:48 photographing an X-ray of 1:14 patient with a stuck &quo... Nurses Fired Over Cell Phone Photos Of Patient by wisn | 7,051 views Nurses, accused of photographing an X-ray of patient with a stuck "sex toy" in the rectum and posting the pictures on the Internet, have been fired. by wisn | 2 years ago | 7,051 views 1:14 Exposing The AirG.com scam ! The program is a scam of stolen pictures ... pictures off people's cell phones ! An identity theft site that invades your privacy, financial informatio and your hipaa medical information ... by IDoNotUseFlourToCook | 2 weeks ago | 20 views 0:24 SecurCopper HIPAA Compliant Medical Text Message System As the possibilities for electronic communication continue to expand with great speed, use of the technology by hospital employees and physicians ... by burtleed1 | 4 days ago | 15 views 0:25 Protecting your cell phone Advertisement Learn how to protect yourself from cell phone spyware. www.tinyurl.com by 13WTHR | 2 years ago | 76,592 views 3:44 5 tips for cell phone security www.PromotionsAndDiscounts.com 5 tips for cell phone security 1. Know Your Phone Keep your phone number and the SIM card number written. You ... by promotionsdiscounts | 7 months ago | 399 views 1:30 HD May 2010: Mobile Phone Security Chief Research Officer Mikko Hyppönen and Security Advisor Sean Sullivan discuss mobile phone security topics from the first 4 months of 2010. by fslabs | 1 year ago | 2,470 views 8:51 Google I/O 2011: Compliance and Security in the Cloud Michael Manoochehri Learn what you need to know to succeed as a Google Apps VAR or customer in the areas of identity management, data migration ... by GoogleDevelopers | 3 months ago | 1,747 views 50:26 HD CC Send secure SMS messages with CellTrust SecureSMS Appliance secure sms hipaa fips sarbox compliant track return receipt tutorial mobile applications gateway text message messaging security banking ... by celltrust | 10 months ago | 428 views 1:20 HD Care Notes Online " "medical record" "home health" "home health notes" HIPAA "smart phone" "cell phone" "browser based" "browser-based care notes" "home ... by marilyngard1 | 1 month ago | 25 views 4:56 HD Famhost - JaRay - Linkwriter - GPS Window Login Process http://www.youtube.com/results?search_query=Mobile+phone+hipaa+security&aq=f Page 1 of 3 TigerText Pro: HIPAA Compliant Text Messaging for iPhones, Androids and Blackberries PLUS: 3 pages of resources from YouTube 13
  • 21. RICKS ’S T LS VAL TOO & For Computer Security: Sophos is the Winner- Swept the Competition in Europe this Month For Secure Correspondence with Clients: The Winner is Privacy Data Systems 14

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n