SlideShare a Scribd company logo
Top 10 Techs for Psychologists
Christopher Royer, Psy.D., David Zehrung, Ph.D., and Brad Norford, Ph.D.
(Representing PPA’s Committee on Technology Implementation)
2013 PPA Annual Convention
June 22, 2013
Dr. Norford Dr. Royer Dr. Zehrung
Synced Cloud Storage Creating a Website Encryption Programs
Electronic Calendars Apps for Psychologists Creating Video-Sharing Med
Virtual Phone System Establishing a Blog Creating Podcasts
Password Management .
Home computer
Any computer
anywhere by
logging
in through the
websiteSmart phone
Work computer
Synced Cloud Storage
Free Synced Storage on the Cloud
Four Popular Synced Cloud Storages
Dropbox (2008 Start-up Company)
Google Drive (Google)
iCloud (Apple)
SkyDrive (Microsoft)
What Makes Synced Cloud Storage Special?
* Free (for lower volumes)
* Reasonably Secure (but encryption needed to make it HIPPA compliant)
* User friendly
* Automatically syncs all similar files so that your data on all devices is up to date
* You can access old versions of any file
* You can easily share the file with any other person who has the service
How to Make Cloud Storage More Secure
* 12 character reasonable password on each computer
* Two-step verification (prevents anyone from accessing your account from another
computer without having your cellphone to authenticate permission from you).
* 14 character, unique, strong password on your cloud account
* Encrypt sensitive files before uploading them to Dropbox
Electronic Calendars
Electronic Calendars
* Free
* Colors, special dates
* Searchable
* Flexible (more portable and customizable than paper schedulers)
* Can be synced across all of your electronic devices
* Use one that is fast/efficient
* Not HIPPA compliant so careful with patient names
* Popular examples: Google Calendar, iCal
Electronic Calendars
Virtual Phone System
Talk to patientTalk to patient
Ignore and
let your recorded
message on the virtual
phone pick it up
Ignore and
let your recorded
message on the virtual
phone pick it up
oror
Landline phoneLandline phone
Therapist’s
personal
cell phone
Therapist’s
personal
cell phone
PatientPatient
Virtual phoneVirtual phone
PsychologistPsychologist
Psychologist A
Psychologist A
Psychologist BPsychologist B
Psychologist C
Psychologist C
Desk phone
Desk phone
Fax
Fax
Personal/Work phone:
Call patient back at any
time through your
business ID and billing
Personal/Work phone:
Call patient back at any
time through your
business ID and billing
Listen later to a
recording of patient’s
message sent to
your e-mail and a cell phone
app
Listen later to a
recording of patient’s
message sent to
your e-mail and a cell phone
app
Popular Virtual Phone Systems
Ring Central
Grasshopper
Virtual PBX
Phone.com
Password Manager
•Makes it feasible to have a different secure password for each
website/account you have
•Allows for one click log-in to websites and auto-fill of username & password
•Allows for one click auto-fill of address and credit card info
•Securely keeps track of all of your passwords
•Contains sections for other essential secure information such as credit cards,
password numbers, file combinations, social security numbers, healthcare
numbers, serial numbers, car information, computer log-in numbers, etc
•Encrypted on your computer hard drive with only you knowing the password
•Can be shared in encrypted form through Dropbox to your other computers
and your cell phone.
Popular Password Manager Systems
1Password
LastPass
Kaspersky
KeePass
Password Manager
Password Manager
Password Manager
10 PRACTICAL STEPS TO TAKE TODAY TO MAKE YOUR
INTERNET EXPERIENCE MORE SECURE...
* Caveat: The following information is comprised of common suggestions gathered from a variety of
sources and from utilizing these programs. I am not am not an expert in electronic security so use this
information as a guideline to your own research.
...to Avoid the End!!
Evil Hacker
1. Firewall and Anti-virus software: Make certain that the firewall is enabled on each of your computers as they
serve to block a wide range of intrusions. Use an easy to manage anti-virus program especially if you have a PC
computer. (Firewall and anti-virus settings are both in the Security Section of your computer.)
2. Passwords for all of your devices:
• Mobile phones and tablets: Without enabling the password anyone who finds your phone has access to your
contacts, e-mail, secure apps, etc. Be sure not to use an obvious pattern (e.g., 4 corners) or simple set of
digits (e.g., 1-2-3-4). Set the phone so that the password becomes necessary anytime your phone is inactive
for more than a few minutes. If available it is a good idea to enable permanent deletion of all information on the
phone if someone tries to log on 10 times unsuccessfully.
• Computers: Enable a password of at least 12 characters meeting the criteria below. There are still ways
around this password but without it anyone who gets hold of your computer has full access.
2. Flashdrives and external harddrives: If your devices have private/sensitive information on them consider
purchasing ones that require a password to open.
3. Different online passwords: Use unique (different) passwords for each of your online accounts. A 12
character password using a mixture of upper and lowercase letters, numbers, and symbols or a 20+ letter
phrase such as “everyoneshouldhaveapet” are rarely broken by even the most powerful computers today.
There are free password generating programs to assist in coming up with strong, unique passwords.
10 Practical Steps for Greater Security
5. Updates: They are annoying, but installing updates that get sent to your computer in a timely
manner does much to foil viruses and the like. Hackers like to exploit the time period between when
a fix is announced and users actually install it.
6. Managing passwords: Do not keep an unsecured file of all your passwords anywhere on your
phone or on your computer. Similarly, if you print it out, best to keep it in a hidden spot and not lying
next to your computer. If you want to keep a file on your computer then that document should be
encrypted. Best of all, use a password manager program or a password keychain built into your
computer.
7. E-mail is only partially secure. Exercise caution in what you send. Hackers use bots and other
programs to search for social security, credit card numbers, account numbers, and words like
“password.” Additionally, everyone occasionally sends e-mail to the wrong person or has an
intended recipient forward it somewhere else. Faxes, phone calls, and text messages are secure
ways to transmit information so any of the secure numbers listed above should be sent in this
manner. Good news: Password protecting sensitive documents such as Excel sheets that you
attach to e-mails remain secure even if the computer or e-mail is accessed by someone unintended.
4. Logging out: Log out of work computers, phone, e-mail, Facebook, and Twitter if you leave
them unattended. (Do you leave your keys and wallet lying around in public?)
8. Security questions: When sites ask for security questions to reset passwords do not keep reusing
the same questions (e.g., Mother’s maiden name) or use questions that an astute hacker could locate
in a search (e.g., name of your high school).
10 Practical Steps for Greater Security
9. Remote data wipe: If your computer, tablet, or phone have the capability to have the contents made
permanently inaccessible by you from another device/location this brings great peace of mind if your
device is stolen or lost. All Apple products and some PC and Android products have this capability.
Enable it and learn how to utilize it in advance in the event so that you need to use it in an emergency.
10. An excellent data back-up plan: Back up your computer confidently and securely. Taking the time to
establish the following steps will keep your electronic treasures of photos, home movies, and all files safe
from the occasional differing disasters of theft, fire, and harddrive crashes:
a. Connect wirelessly to a harddrive that automatically backs up any changes to the complete contents of
your computers every hour. (For Mac users, the Time Capsule is the product for this.) You can also
connect any computer to an external hard drive that backs up changes automatically every night.
b. Back up your files remotely on an easy-to-use, free, cloud based service like Dropbox. Dropbox can
do photos too but there will be a cost if there are many photos. It is not an efficient back-up for movies.
c. Periodically back up your photos on a flashdrive that you keep at a relative’s home, in a safe, or at a
secure place at work in case your computer is lost or damaged.
d. Periodically back up your movies, photos, and files on an external hard drive that you hide elsewhere
in your house. Or, pay for secure cloud storage with a company such as Carbonite and upload a backup
there.
10 Practical Steps for Greater Security

More Related Content

What's hot

IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
iteclearners
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
Damian T. Gordon
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
Michael Lew
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
GoTrust ID
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 

What's hot (20)

IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Similar to Essential Technologies for Psychologists

Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
Shanmugavel Sankaran
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
pcsafe
 
Internet
InternetInternet
Internet
youssefchefcher
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-bBbAOC
 
STH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetSTH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetMorgan Prince
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
TechSoup
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
unit-19-data-security-2-model-answers.pptx
unit-19-data-security-2-model-answers.pptxunit-19-data-security-2-model-answers.pptx
unit-19-data-security-2-model-answers.pptx
tarasenkod781
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
Techvera
 

Similar to Essential Technologies for Psychologists (20)

Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
MADS6638
MADS6638MADS6638
MADS6638
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Internet
InternetInternet
Internet
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
STH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetSTH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheet
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
unit-19-data-security-2-model-answers.pptx
unit-19-data-security-2-model-answers.pptxunit-19-data-security-2-model-answers.pptx
unit-19-data-security-2-model-answers.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 

Recently uploaded

Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
Dr. Rabia Inam Gandapore
 
Antiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptxAntiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptx
Rohit chaurpagar
 
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness JourneyTom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
greendigital
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
Shweta
 
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
Swetaba Besh
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
Little Cross Family Clinic
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Dr Jeenal Mistry
 
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyayaCharaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Dr KHALID B.M
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
SumeraAhmad5
 
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
i3 Health
 
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Saeid Safari
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
Anurag Sharma
 
Surgical Site Infections, pathophysiology, and prevention.pptx
Surgical Site Infections, pathophysiology, and prevention.pptxSurgical Site Infections, pathophysiology, and prevention.pptx
Surgical Site Infections, pathophysiology, and prevention.pptx
jval Landero
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in StockFactory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
rebeccabio
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
Levi Shapiro
 
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
Savita Shen $i11
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
MedicoseAcademics
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
Dr. Vinay Pareek
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Savita Shen $i11
 

Recently uploaded (20)

Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
 
Antiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptxAntiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptx
 
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness JourneyTom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journey
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
 
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
 
Are There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdfAre There Any Natural Remedies To Treat Syphilis.pdf
Are There Any Natural Remedies To Treat Syphilis.pdf
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
 
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyayaCharaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
Charaka Samhita Sutra Sthana 9 Chapter khuddakachatuspadadhyaya
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
 
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...
 
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
 
Surgical Site Infections, pathophysiology, and prevention.pptx
Surgical Site Infections, pathophysiology, and prevention.pptxSurgical Site Infections, pathophysiology, and prevention.pptx
Surgical Site Infections, pathophysiology, and prevention.pptx
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in StockFactory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
 
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
Phone Us ❤85270-49040❤ #ℂall #gIRLS In Surat By Surat @ℂall @Girls Hotel With...
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
 

Essential Technologies for Psychologists

  • 1. Top 10 Techs for Psychologists Christopher Royer, Psy.D., David Zehrung, Ph.D., and Brad Norford, Ph.D. (Representing PPA’s Committee on Technology Implementation) 2013 PPA Annual Convention June 22, 2013 Dr. Norford Dr. Royer Dr. Zehrung Synced Cloud Storage Creating a Website Encryption Programs Electronic Calendars Apps for Psychologists Creating Video-Sharing Med Virtual Phone System Establishing a Blog Creating Podcasts Password Management .
  • 2. Home computer Any computer anywhere by logging in through the websiteSmart phone Work computer Synced Cloud Storage Free Synced Storage on the Cloud
  • 3. Four Popular Synced Cloud Storages Dropbox (2008 Start-up Company) Google Drive (Google) iCloud (Apple) SkyDrive (Microsoft)
  • 4. What Makes Synced Cloud Storage Special? * Free (for lower volumes) * Reasonably Secure (but encryption needed to make it HIPPA compliant) * User friendly * Automatically syncs all similar files so that your data on all devices is up to date * You can access old versions of any file * You can easily share the file with any other person who has the service
  • 5. How to Make Cloud Storage More Secure * 12 character reasonable password on each computer * Two-step verification (prevents anyone from accessing your account from another computer without having your cellphone to authenticate permission from you). * 14 character, unique, strong password on your cloud account * Encrypt sensitive files before uploading them to Dropbox
  • 7. Electronic Calendars * Free * Colors, special dates * Searchable * Flexible (more portable and customizable than paper schedulers) * Can be synced across all of your electronic devices * Use one that is fast/efficient * Not HIPPA compliant so careful with patient names * Popular examples: Google Calendar, iCal
  • 9. Virtual Phone System Talk to patientTalk to patient Ignore and let your recorded message on the virtual phone pick it up Ignore and let your recorded message on the virtual phone pick it up oror Landline phoneLandline phone Therapist’s personal cell phone Therapist’s personal cell phone PatientPatient Virtual phoneVirtual phone PsychologistPsychologist Psychologist A Psychologist A Psychologist BPsychologist B Psychologist C Psychologist C Desk phone Desk phone Fax Fax Personal/Work phone: Call patient back at any time through your business ID and billing Personal/Work phone: Call patient back at any time through your business ID and billing Listen later to a recording of patient’s message sent to your e-mail and a cell phone app Listen later to a recording of patient’s message sent to your e-mail and a cell phone app
  • 10. Popular Virtual Phone Systems Ring Central Grasshopper Virtual PBX Phone.com
  • 11. Password Manager •Makes it feasible to have a different secure password for each website/account you have •Allows for one click log-in to websites and auto-fill of username & password •Allows for one click auto-fill of address and credit card info •Securely keeps track of all of your passwords •Contains sections for other essential secure information such as credit cards, password numbers, file combinations, social security numbers, healthcare numbers, serial numbers, car information, computer log-in numbers, etc •Encrypted on your computer hard drive with only you knowing the password •Can be shared in encrypted form through Dropbox to your other computers and your cell phone.
  • 12. Popular Password Manager Systems 1Password LastPass Kaspersky KeePass
  • 16. 10 PRACTICAL STEPS TO TAKE TODAY TO MAKE YOUR INTERNET EXPERIENCE MORE SECURE... * Caveat: The following information is comprised of common suggestions gathered from a variety of sources and from utilizing these programs. I am not am not an expert in electronic security so use this information as a guideline to your own research. ...to Avoid the End!! Evil Hacker
  • 17. 1. Firewall and Anti-virus software: Make certain that the firewall is enabled on each of your computers as they serve to block a wide range of intrusions. Use an easy to manage anti-virus program especially if you have a PC computer. (Firewall and anti-virus settings are both in the Security Section of your computer.) 2. Passwords for all of your devices: • Mobile phones and tablets: Without enabling the password anyone who finds your phone has access to your contacts, e-mail, secure apps, etc. Be sure not to use an obvious pattern (e.g., 4 corners) or simple set of digits (e.g., 1-2-3-4). Set the phone so that the password becomes necessary anytime your phone is inactive for more than a few minutes. If available it is a good idea to enable permanent deletion of all information on the phone if someone tries to log on 10 times unsuccessfully. • Computers: Enable a password of at least 12 characters meeting the criteria below. There are still ways around this password but without it anyone who gets hold of your computer has full access. 2. Flashdrives and external harddrives: If your devices have private/sensitive information on them consider purchasing ones that require a password to open. 3. Different online passwords: Use unique (different) passwords for each of your online accounts. A 12 character password using a mixture of upper and lowercase letters, numbers, and symbols or a 20+ letter phrase such as “everyoneshouldhaveapet” are rarely broken by even the most powerful computers today. There are free password generating programs to assist in coming up with strong, unique passwords. 10 Practical Steps for Greater Security
  • 18. 5. Updates: They are annoying, but installing updates that get sent to your computer in a timely manner does much to foil viruses and the like. Hackers like to exploit the time period between when a fix is announced and users actually install it. 6. Managing passwords: Do not keep an unsecured file of all your passwords anywhere on your phone or on your computer. Similarly, if you print it out, best to keep it in a hidden spot and not lying next to your computer. If you want to keep a file on your computer then that document should be encrypted. Best of all, use a password manager program or a password keychain built into your computer. 7. E-mail is only partially secure. Exercise caution in what you send. Hackers use bots and other programs to search for social security, credit card numbers, account numbers, and words like “password.” Additionally, everyone occasionally sends e-mail to the wrong person or has an intended recipient forward it somewhere else. Faxes, phone calls, and text messages are secure ways to transmit information so any of the secure numbers listed above should be sent in this manner. Good news: Password protecting sensitive documents such as Excel sheets that you attach to e-mails remain secure even if the computer or e-mail is accessed by someone unintended. 4. Logging out: Log out of work computers, phone, e-mail, Facebook, and Twitter if you leave them unattended. (Do you leave your keys and wallet lying around in public?) 8. Security questions: When sites ask for security questions to reset passwords do not keep reusing the same questions (e.g., Mother’s maiden name) or use questions that an astute hacker could locate in a search (e.g., name of your high school). 10 Practical Steps for Greater Security
  • 19. 9. Remote data wipe: If your computer, tablet, or phone have the capability to have the contents made permanently inaccessible by you from another device/location this brings great peace of mind if your device is stolen or lost. All Apple products and some PC and Android products have this capability. Enable it and learn how to utilize it in advance in the event so that you need to use it in an emergency. 10. An excellent data back-up plan: Back up your computer confidently and securely. Taking the time to establish the following steps will keep your electronic treasures of photos, home movies, and all files safe from the occasional differing disasters of theft, fire, and harddrive crashes: a. Connect wirelessly to a harddrive that automatically backs up any changes to the complete contents of your computers every hour. (For Mac users, the Time Capsule is the product for this.) You can also connect any computer to an external hard drive that backs up changes automatically every night. b. Back up your files remotely on an easy-to-use, free, cloud based service like Dropbox. Dropbox can do photos too but there will be a cost if there are many photos. It is not an efficient back-up for movies. c. Periodically back up your photos on a flashdrive that you keep at a relative’s home, in a safe, or at a secure place at work in case your computer is lost or damaged. d. Periodically back up your movies, photos, and files on an external hard drive that you hide elsewhere in your house. Or, pay for secure cloud storage with a company such as Carbonite and upload a backup there. 10 Practical Steps for Greater Security