Thomas F. Heston, MD protect your data, setup a teleradiology network, and customize your Internet CME Computer Gadgets an...
Protecting Your  Data
Even Top Institutions are Vulnerable
Internet Safety “ You cannot trust the Internet. You can only grow to respect it and understand its inherent problems and ...
Secure Your Data <ul><li>Never give out all of your secrets
Redundancy </li><ul><li>put up multiple barriers
encryption and password protection </li></ul><li>Monitor breaches </li><ul><li>record intrusions into your system
have regular HIPAA meetings for TQI </li></ul></ul>
Principles <ul><li>Encrypt everything </li><ul><li>Email is not secure unless encrypted
Resource to encrypt email:  PGP  – pretty good privacy
Encrypt data before storing online </li></ul><li>Limit what is available online
Don't create a centralized data center where a single break-in releases a flood of data </li></ul>
Safety Tools <ul><li>Password protection </li><ul><li>Roboform  - passwords  and  usernames
Saves hours and hours of time </li></ul><li>Server protection </li><ul><li>Advanced Policy Firewall  - monitoring and real...
Hardware Firewalls  </li></ul><li>Data protection: encryption </li></ul>
How to Setup a Simple Teleradiology Program
Disclaimer: you are responsible for HIPAA compliance. This is an example only and does not cover data security methods in ...
VPN vs Bouncing <ul><li>VPN  </li><ul><li>creates a tunnel within the Internet
allows access to entire database
typical for large clinics or hospitals </li></ul><li>Bouncing </li><ul><li>encrypted data pushed to a server
encrypted data then pulled off of server
database stored offline
less expensive and possibly more secure for small programs </li></ul></ul>
VPN Tunnel 1. Push Encrypted Data for One to Just a Few Patients 3. Pull Encrypted Data note: main database is stored  off...
VPN vs Setting up a  Dedicated Server <ul><li>VPN </li><ul><li>complex and expensive
Upcoming SlideShare
Loading in …5
×

SNM 2009 Abstract: Computer Gadgets and Hacks

592 views

Published on

Computer Gadgets and Hacks for the Nuclear Medicine Professional, an oral presentation given at the Society of Nuclear Medicine's 2009 Annual Meeting held in Toronto, Canada. How to setup a teleradiology program, get online CME, and educate your staff

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
592
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

SNM 2009 Abstract: Computer Gadgets and Hacks

  1. 1. Thomas F. Heston, MD protect your data, setup a teleradiology network, and customize your Internet CME Computer Gadgets and Hacks for the Nuclear Medicine Professional
  2. 2. Protecting Your Data
  3. 3. Even Top Institutions are Vulnerable
  4. 4. Internet Safety “ You cannot trust the Internet. You can only grow to respect it and understand its inherent problems and learn some basic common solutions.” Black Hat: Misfits Criminals, and Scammers
  5. 5. Secure Your Data <ul><li>Never give out all of your secrets
  6. 6. Redundancy </li><ul><li>put up multiple barriers
  7. 7. encryption and password protection </li></ul><li>Monitor breaches </li><ul><li>record intrusions into your system
  8. 8. have regular HIPAA meetings for TQI </li></ul></ul>
  9. 9. Principles <ul><li>Encrypt everything </li><ul><li>Email is not secure unless encrypted
  10. 10. Resource to encrypt email: PGP – pretty good privacy
  11. 11. Encrypt data before storing online </li></ul><li>Limit what is available online
  12. 12. Don't create a centralized data center where a single break-in releases a flood of data </li></ul>
  13. 13. Safety Tools <ul><li>Password protection </li><ul><li>Roboform - passwords and usernames
  14. 14. Saves hours and hours of time </li></ul><li>Server protection </li><ul><li>Advanced Policy Firewall - monitoring and real-time updating of unix IP tables
  15. 15. Hardware Firewalls </li></ul><li>Data protection: encryption </li></ul>
  16. 16. How to Setup a Simple Teleradiology Program
  17. 17. Disclaimer: you are responsible for HIPAA compliance. This is an example only and does not cover data security methods in depth.
  18. 18. VPN vs Bouncing <ul><li>VPN </li><ul><li>creates a tunnel within the Internet
  19. 19. allows access to entire database
  20. 20. typical for large clinics or hospitals </li></ul><li>Bouncing </li><ul><li>encrypted data pushed to a server
  21. 21. encrypted data then pulled off of server
  22. 22. database stored offline
  23. 23. less expensive and possibly more secure for small programs </li></ul></ul>
  24. 24. VPN Tunnel 1. Push Encrypted Data for One to Just a Few Patients 3. Pull Encrypted Data note: main database is stored offline entire database always available via the Internet VPN vs Bouncing 2. Bounce Data off Dedicated Server
  25. 25. VPN vs Setting up a Dedicated Server <ul><li>VPN </li><ul><li>complex and expensive
  26. 26. requires permanent staff to maintain
  27. 27. hire someone else to do this </li></ul><li>Setting up a Dedicated Server </li><ul><li>do-it-yourself
  28. 28. inexpensive
  29. 29. may be able to use consultants only </li></ul></ul>
  30. 30. Step 1. Get a Provider With 24/7 Support MegaSimpleDomains.com
  31. 31. Step 2 (Final Step). Get a Unix Assisted Service Plan
  32. 32. Personalized Continuing Education
  33. 33. Personalized CME <ul><li>iGoogle Gadgets </li><ul><li>allows you to customize your homepage
  34. 34. http://www.igoogle.com </li></ul><li>WebShots </li><ul><li>customized personal screensavers </li></ul><li>Office Screensavers </li><ul><li>keeps staff up-to-date with latest news
  35. 35. change once from central location </li></ul></ul>
  36. 36. Customized Homepages
  37. 37. Customized Screensavers
  38. 38. Personal TQI
  39. 39. Personalized Feedback Loops
  40. 41. Contribute Your Expertise
  41. 42. Contribute to NuclearWiki.com
  42. 44. Thank You! <ul>Follow Me Online <ul><li>Twitter: http://Twitter.com/tomheston
  43. 45. Facebook: http://profile.to/tomheston
  44. 46. MySpace: http://myspace.com/tomheston </li></ul></ul>

×