Bill Walter of Gross Mendelsohn's Technology Solutions Group presented this seminar at the Health Facilities of Maryland's annual conference. The presentation is for executive directors, administrators and technology directors of skilled nursing facilities, assisted living facilities, continuing care retirement communities, and other long term healthcare organizations.
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Top 6 Technology Threats to Your Long Term Care Organization
1. The Top Six Technology
Threats to Your Long
Term Care Organization
Bill Walter, MCP, MCSE
2. Security
“While you may have security without
privacy, you can't have privacy without
security.”
— Jonathan Gossels, president and CEO, SystemExperts
3. Agenda
• Top six threats with steps to mitigate risk
• Demonstration
• Questions
7. How to minimize your risk
• Update firmware and operating system
• Perform monthly security probe scans
• Automatic monitoring with alerting
• Secure wireless for authorized use only
• Encrypt outgoing data when necessary
9. How to minimize your risk
• Use VPN combined with two-factor
authentication
• Use network access control software
• Strictly limit use of VNC, GoToMyPC, or
LogMeIn to approved users only
11. How to minimize your risk
• Antivirus / antimalware
• Network access control software
• Use of remote locking software
– Computer LoJack
– MobileMe
• Ensure underlying system is patched and
secured
12. “I think computer viruses
should count as life. I think
it says something about
human nature that the
only form of life we have
created so far is purely
destructive…”
―Stephen Hawking
13. Threat 5: virus and malware
• Email
• File transfer
• Removable devices
• Web
14. How to minimize your risk
• Active multiple layer protection
• Strict secure file transfer solution
• Block unauthorized removable devices
• Monitor and limit web access
16. How to minimize your risk
• Provide adequate training for each
necessary task
• Create and maintain acceptable use policy
for all employees
• Review and document inappropriate use