SlideShare una empresa de Scribd logo
1 de 21
RICKS
   ’S T LS
VAL TOO
   &



      Mission Impossible
       Protect Your Data from CyberSpace, HIPAA
                  Breaches and GVT’s*

                      (*Garden Variety Thieves)

               presented by Valerie R. Houghton, RN, MFT, JD
                           September 30, 2011
RICKS
   ’S T LS
 AL OO
V T
   &




 What Kinds of Tools Do We
          Need?              2
RICKS
   ’S T LS
 AL OO
V T
   &




 What Kinds of Tools Do We
          Need?              2
RICKS
   ’S T LS
VAL TOO
   &




   Does This Sound Familiar?
               Nahhhhhhh......
                                 3
RICKS
   ’S T LS
VAL TOO
   &




   Does This Sound Familiar?
               Nahhhhhhh......
                                 3
RICKS
   ’S T LS
VAL TOO
   &




Encryption:



               4
RICKS
   ’S T LS
VAL TOO
   &




Encryption:       Email
               Data Packets
                   Files
                  Discs


                              4
RICKS
   ’S T LS
VAL TOO
   &


    Comparison of Platforms:




                               5
RICKS
   ’S T LS
VAL TOO
   &


    Comparison of Platforms:
  * Most Programs are Designed for PC Users
   *Most Are Designed for Large Healthcare
     Organizations, Banks & Law Firms...

               $$ Chuuuh - Chingg $$
                                              5
RICKS
   ’S T LS
VAL TOO
   &




          There Are Less Expensive
                Alternatives!
       ... After Reviewing Dozens of
   Articles, Sites, Blogs & Listserves and
   Chats w/Enthusiastic Sales Persons....    6
RICKS
   ’S T LS
VAL TOO
   &




        So, What Are the Best
             Programs?


                                7
RICKS
   ’S T LS
VAL TOO
   &




        So, What Are the Best
             Programs?
          In the Interest of Freedom of
           Choice...May We Present...
                                          7
RICKS
   ’S T LS
VAL TOO
   &




               8
RICKS
   ’S T LS
VAL TOO
   &


    Primary “Gotta Have These:”
                   *1Password
                    *Evernote
                     *Sophos
                   *SpiderOak
                    *Dropbox

                                  8
RICKS
   ’S T LS
VAL TOO
   &




Start by Saving All Client Data in
Encrypted Form in Files on Your
            Computer                 9
RICKS
   ’S T LS
VAL TOO
   &



           And for the PC Users...
                                 how to encrypt files on pc - YouTube                                                                                                                      8/28/11 5:23 PM




                                                         how to encrypt files on pc                                                        Search       Browse      Movies   Upload   valerierhoughton




                 Check Out       Search results for how to encrypt files on pc
                                 About 276 results

                                 Filter


                                                             Intel Anti-Theft Security
                                                             Intel® Powered Laptops Can Disable
                                                             If Lost or Stolen! Learn More Now.
                                                                                                                                                                                      Sort by: Relevance




                 YouTube...
                                                             by channelintel | 20,263 views
                                                      2:31
                                                                                                                                                  Promoted Videos

                                                             Cheap GPU Upgrades! How To Encrypt A File Before You Send It, Sennheiser ...
                                                             SongFacts.com: It's Like IMDB for Music! Our favorite FREE encryption software runs on any OS.
                                                             Transfer Mac Files to a PC FAST. HTPC Tuner Cards ...
                                                             by TEKHD | 2 months ago | 3,979 views
                                                     30:33
                                                              HD


                                                             How To Encrypt Files (Windows)
                                                             This is a video on how to encrypt files you wish to protect. The download link is:
                                                             www.brothersoft.com Please comment, rate, and subscribe ...
                                                             by ebildude123 | 3 months ago | 51 views
                                                      2:27


                                                             Encrypt files and folders in windows 7 and vista




                 3 Pages of
                                                             how to encrypt your files and folders on windows 7 and vista so only you should be able to see
                                                             them, that means if you lose your computer people ...
                                                             by yankiadler | 1 year ago | 5,481 views
                                                      2:01
                                                              HD


                                                             Tutorial #60 ( how to encrypt files on windows)
                                                             Hey guys geektechtutorial here and in this tutorial I show you how to encrypt files on windows.
                                                             Conceal download Link:www.dataconceal.com/download ...
                                                             by geektechtut1archive | 5 months ago | 31 views
                                                      4:39
                                                              HD




               Results in 0.02
                                                             Introduction to Video Padlock - How to Encrypt your files easily and securely
                                                             www.applian.com Watch how easy it is to encrypt any file on your computer. Great if you share
                                                             your PC with anyone.
                                                             by ApplianTechnologies | 1 year ago | 4,170 views
                                                      2:11
                                                              HD


                                                             How to encrypt a file MAC
                                                             Need help with another mac related problem, comment and I will make a video on it. In case you
                                                             had trouble here are the steps: 1. Load Disk ...
                                                             by legolego123123 | 1 year ago | 954 views




                  Seconds
                                                      2:55


                                                             How to Encrypt (Password-Protect) Your Files
                                                             This video will show you how to hide and encrypt important or private files using a free program
                                                             called TrueCrypt - www.truecrypt.org Be sure to ...
                                                             by italdj | 3 years ago | 7,384 views
                                                      3:14


                                                             Windows Encryption Software Instantly Encrypts Files And Fo
                                                             windowsencryption.org see how this software instantly encrypts files and folders on your
                                                             Windows XP or Vista PC. Automatic Windows encryption ...
                                                             by transom284 | 2 years ago | 400 views
                                                      2:49




                                                                                                                                                                                                               10
                                                             How to encrypt files in MacOS X tutorial.
                                                             This tutorial shows you how to use encrypted disk images in MacOS X to transfer files securely,
                                                             and to store files on your mac in a secure manner ...
                                                             by nenewsjunkie | 2 years ago | 129 views
                                                      8:20




                                 http://www.youtube.com/results?search_query=how+to+encrypt+files+on+pc&aq=f                                                                                     Page 1 of 3
RICKS
   ’S T LS
VAL TOO
   &




               11
RICKS
   ’S T LS
VAL TOO
   &




   1Password: Can sync across
       devices- encrypted & can
         generate passwords
     No Storage of Non-Encrypted Material
      & the Master Password is Generated
       Locally & Not Stored in the Cloud    11
RICKS
   ’S T LS
VAL TOO
   &


 Dropbox: is not secure, but if you put encrypted
 data into it- it’s ok & the cross-device syncing is perfect!

   SpiderOak: is secure because the password is
       never stored on their server & all encrypted.

 Evernote: is not secure. Fantastic program for
 saving articles, web clippings,with file sharing and ability
 to sync with all of your devices.

                                                                12
RICKS
   ’S T LS
VAL TOO
   &
                           Mobile phone hipaa security - YouTube                                                                                                                                        8/28/11 6:30 PM




                                                  Mobile phone hipaa security                                                           Search      Browse   Movies     Upload                    valerierhoughton


                           Search results for Mobile phone hipaa security                                                                                                                        Sort by: Relevance

                           About 30 results

                           Filter

                                                                                                                                                                                                           Featured Videos
                                                      Security Breach is Dangerous for Medical
                                                      Medical practices are especially vulnerable to security and data breach because of the volume of                                      Nurses Fired Over Cell
                                                      patient records they store. HIPAA does not ...
                                                                                                                                                                                            Phone Photos Of Patient
                                                      by APSAbusinesssecurity | 8 months ago | 59 views
                                                                                                                                                                                            Nurses, accused of
                                               7:48
                                                                                                                                                                                            photographing an X-ray of
                                                                                                                                                                                  1:14      patient with a stuck &quo...
                                                      Nurses Fired Over Cell Phone Photos Of Patient
                                                                                                                                                               by wisn | 7,051 views
                                                      Nurses, accused of photographing an X-ray of patient with a stuck "sex toy" in the rectum and
                                                      posting the pictures on the Internet, have been fired.
                                                      by wisn | 2 years ago | 7,051 views
                                               1:14


                                                      Exposing The AirG.com scam ! The program is a scam of stolen pictures ...
                                                      pictures off people's cell phones ! An identity theft site that invades your privacy, financial
                                                      informatio and your hipaa medical information ...
                                                      by IDoNotUseFlourToCook | 2 weeks ago | 20 views
                                               0:24


                                                      SecurCopper HIPAA Compliant Medical Text Message System
                                                      As the possibilities for electronic communication continue to expand with great speed, use of the
                                                      technology by hospital employees and physicians ...
                                                      by burtleed1 | 4 days ago | 15 views
                                               0:25


                                                      Protecting your cell phone                                                                                                       Advertisement
                                                      Learn how to protect yourself from cell phone spyware. www.tinyurl.com
                                                      by 13WTHR | 2 years ago | 76,592 views

                                               3:44


                                                      5 tips for cell phone security
                                                      www.PromotionsAndDiscounts.com 5 tips for cell phone security 1. Know Your Phone Keep your
                                                      phone number and the SIM card number written. You ...
                                                      by promotionsdiscounts | 7 months ago | 399 views
                                               1:30
                                                       HD


                                                      May 2010: Mobile Phone Security
                                                      Chief Research Officer Mikko Hyppönen and Security Advisor Sean Sullivan discuss mobile
                                                      phone security topics from the first 4 months of 2010.
                                                      by fslabs | 1 year ago | 2,470 views
                                               8:51


                                                      Google I/O 2011: Compliance and Security in the Cloud
                                                      Michael Manoochehri Learn what you need to know to succeed as a Google Apps VAR or
                                                      customer in the areas of identity management, data migration ...
                                                      by GoogleDevelopers | 3 months ago | 1,747 views
                                              50:26
                                                       HD   CC


                                                      Send secure SMS messages with CellTrust SecureSMS Appliance
                                                      secure sms hipaa fips sarbox compliant track return receipt tutorial mobile applications gateway
                                                      text message messaging security banking ...
                                                      by celltrust | 10 months ago | 428 views
                                               1:20
                                                       HD


                                                      Care Notes Online
                                                      " "medical record" "home health" "home health notes" HIPAA "smart phone" "cell phone"
                                                      "browser based" "browser-based care notes" "home ...
                                                      by marilyngard1 | 1 month ago | 25 views
                                               4:56
                                                       HD


                                                      Famhost - JaRay - Linkwriter - GPS Window Login Process


                           http://www.youtube.com/results?search_query=Mobile+phone+hipaa+security&aq=f                                                                                                         Page 1 of 3




    TigerText Pro: HIPAA Compliant Text
    Messaging for iPhones, Androids and
                Blackberries
  PLUS: 3 pages of resources from YouTube
                                                                                                                                                                                                                              13
RICKS
   ’S T LS
VAL TOO
   &




  For Computer Security: Sophos     is the Winner- Swept
          the Competition in Europe this Month
   For Secure Correspondence with Clients: The Winner is
               Privacy Data Systems                        14

Más contenido relacionado

Similar a Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
AUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptxAUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptxDJ Nag
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharingwilkmjw
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkitsamiable_indian
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsVikas Jain
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library ProgramRino Landa
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxYashSomalkar
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014TGodfrey
 
Think Blockchain Series
Think Blockchain SeriesThink Blockchain Series
Think Blockchain SeriesManojPappu
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublinDerek King
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfxererenhosdominaram
 

Similar a Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations (20)

Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Itech 1005
Itech 1005Itech 1005
Itech 1005
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
AUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptxAUTM_WRM_Blockchain FINAL.pptx
AUTM_WRM_Blockchain FINAL.pptx
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Think Blockchain Series
Think Blockchain SeriesThink Blockchain Series
Think Blockchain Series
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdfLinux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
 

Más de Valerie Houghton

Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short VersionValerie Houghton
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short VersionValerie Houghton
 
Parental Contact Resistance
Parental Contact ResistanceParental Contact Resistance
Parental Contact ResistanceValerie Houghton
 
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Valerie Houghton
 
9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.ComValerie Houghton
 

Más de Valerie Houghton (6)

Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
Mission Impossible Short Version
Mission Impossible Short VersionMission Impossible Short Version
Mission Impossible Short Version
 
Parental Contact Resistance
Parental Contact ResistanceParental Contact Resistance
Parental Contact Resistance
 
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
Parental Contact Resistance Post-Elkins: Whose Voice Are We Hearing?
 
9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com9.8.10 VRH At Racial Dialogue.Com
9.8.10 VRH At Racial Dialogue.Com
 
The Clients Virtual File
The Clients Virtual FileThe Clients Virtual File
The Clients Virtual File
 

Último

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations

  • 1. RICKS ’S T LS VAL TOO & Mission Impossible Protect Your Data from CyberSpace, HIPAA Breaches and GVT’s* (*Garden Variety Thieves) presented by Valerie R. Houghton, RN, MFT, JD September 30, 2011
  • 2. RICKS ’S T LS AL OO V T & What Kinds of Tools Do We Need? 2
  • 3. RICKS ’S T LS AL OO V T & What Kinds of Tools Do We Need? 2
  • 4. RICKS ’S T LS VAL TOO & Does This Sound Familiar? Nahhhhhhh...... 3
  • 5. RICKS ’S T LS VAL TOO & Does This Sound Familiar? Nahhhhhhh...... 3
  • 6. RICKS ’S T LS VAL TOO & Encryption: 4
  • 7. RICKS ’S T LS VAL TOO & Encryption: Email Data Packets Files Discs 4
  • 8. RICKS ’S T LS VAL TOO & Comparison of Platforms: 5
  • 9. RICKS ’S T LS VAL TOO & Comparison of Platforms: * Most Programs are Designed for PC Users *Most Are Designed for Large Healthcare Organizations, Banks & Law Firms... $$ Chuuuh - Chingg $$ 5
  • 10. RICKS ’S T LS VAL TOO & There Are Less Expensive Alternatives! ... After Reviewing Dozens of Articles, Sites, Blogs & Listserves and Chats w/Enthusiastic Sales Persons.... 6
  • 11. RICKS ’S T LS VAL TOO & So, What Are the Best Programs? 7
  • 12. RICKS ’S T LS VAL TOO & So, What Are the Best Programs? In the Interest of Freedom of Choice...May We Present... 7
  • 13. RICKS ’S T LS VAL TOO & 8
  • 14. RICKS ’S T LS VAL TOO & Primary “Gotta Have These:” *1Password *Evernote *Sophos *SpiderOak *Dropbox 8
  • 15. RICKS ’S T LS VAL TOO & Start by Saving All Client Data in Encrypted Form in Files on Your Computer 9
  • 16. RICKS ’S T LS VAL TOO & And for the PC Users... how to encrypt files on pc - YouTube 8/28/11 5:23 PM how to encrypt files on pc Search Browse Movies Upload valerierhoughton Check Out Search results for how to encrypt files on pc About 276 results Filter Intel Anti-Theft Security Intel® Powered Laptops Can Disable If Lost or Stolen! Learn More Now. Sort by: Relevance YouTube... by channelintel | 20,263 views 2:31 Promoted Videos Cheap GPU Upgrades! How To Encrypt A File Before You Send It, Sennheiser ... SongFacts.com: It's Like IMDB for Music! Our favorite FREE encryption software runs on any OS. Transfer Mac Files to a PC FAST. HTPC Tuner Cards ... by TEKHD | 2 months ago | 3,979 views 30:33 HD How To Encrypt Files (Windows) This is a video on how to encrypt files you wish to protect. The download link is: www.brothersoft.com Please comment, rate, and subscribe ... by ebildude123 | 3 months ago | 51 views 2:27 Encrypt files and folders in windows 7 and vista 3 Pages of how to encrypt your files and folders on windows 7 and vista so only you should be able to see them, that means if you lose your computer people ... by yankiadler | 1 year ago | 5,481 views 2:01 HD Tutorial #60 ( how to encrypt files on windows) Hey guys geektechtutorial here and in this tutorial I show you how to encrypt files on windows. Conceal download Link:www.dataconceal.com/download ... by geektechtut1archive | 5 months ago | 31 views 4:39 HD Results in 0.02 Introduction to Video Padlock - How to Encrypt your files easily and securely www.applian.com Watch how easy it is to encrypt any file on your computer. Great if you share your PC with anyone. by ApplianTechnologies | 1 year ago | 4,170 views 2:11 HD How to encrypt a file MAC Need help with another mac related problem, comment and I will make a video on it. In case you had trouble here are the steps: 1. Load Disk ... by legolego123123 | 1 year ago | 954 views Seconds 2:55 How to Encrypt (Password-Protect) Your Files This video will show you how to hide and encrypt important or private files using a free program called TrueCrypt - www.truecrypt.org Be sure to ... by italdj | 3 years ago | 7,384 views 3:14 Windows Encryption Software Instantly Encrypts Files And Fo windowsencryption.org see how this software instantly encrypts files and folders on your Windows XP or Vista PC. Automatic Windows encryption ... by transom284 | 2 years ago | 400 views 2:49 10 How to encrypt files in MacOS X tutorial. This tutorial shows you how to use encrypted disk images in MacOS X to transfer files securely, and to store files on your mac in a secure manner ... by nenewsjunkie | 2 years ago | 129 views 8:20 http://www.youtube.com/results?search_query=how+to+encrypt+files+on+pc&aq=f Page 1 of 3
  • 17. RICKS ’S T LS VAL TOO & 11
  • 18. RICKS ’S T LS VAL TOO & 1Password: Can sync across devices- encrypted & can generate passwords No Storage of Non-Encrypted Material & the Master Password is Generated Locally & Not Stored in the Cloud 11
  • 19. RICKS ’S T LS VAL TOO & Dropbox: is not secure, but if you put encrypted data into it- it’s ok & the cross-device syncing is perfect! SpiderOak: is secure because the password is never stored on their server & all encrypted. Evernote: is not secure. Fantastic program for saving articles, web clippings,with file sharing and ability to sync with all of your devices. 12
  • 20. RICKS ’S T LS VAL TOO & Mobile phone hipaa security - YouTube 8/28/11 6:30 PM Mobile phone hipaa security Search Browse Movies Upload valerierhoughton Search results for Mobile phone hipaa security Sort by: Relevance About 30 results Filter Featured Videos Security Breach is Dangerous for Medical Medical practices are especially vulnerable to security and data breach because of the volume of Nurses Fired Over Cell patient records they store. HIPAA does not ... Phone Photos Of Patient by APSAbusinesssecurity | 8 months ago | 59 views Nurses, accused of 7:48 photographing an X-ray of 1:14 patient with a stuck &quo... Nurses Fired Over Cell Phone Photos Of Patient by wisn | 7,051 views Nurses, accused of photographing an X-ray of patient with a stuck "sex toy" in the rectum and posting the pictures on the Internet, have been fired. by wisn | 2 years ago | 7,051 views 1:14 Exposing The AirG.com scam ! The program is a scam of stolen pictures ... pictures off people's cell phones ! An identity theft site that invades your privacy, financial informatio and your hipaa medical information ... by IDoNotUseFlourToCook | 2 weeks ago | 20 views 0:24 SecurCopper HIPAA Compliant Medical Text Message System As the possibilities for electronic communication continue to expand with great speed, use of the technology by hospital employees and physicians ... by burtleed1 | 4 days ago | 15 views 0:25 Protecting your cell phone Advertisement Learn how to protect yourself from cell phone spyware. www.tinyurl.com by 13WTHR | 2 years ago | 76,592 views 3:44 5 tips for cell phone security www.PromotionsAndDiscounts.com 5 tips for cell phone security 1. Know Your Phone Keep your phone number and the SIM card number written. You ... by promotionsdiscounts | 7 months ago | 399 views 1:30 HD May 2010: Mobile Phone Security Chief Research Officer Mikko Hyppönen and Security Advisor Sean Sullivan discuss mobile phone security topics from the first 4 months of 2010. by fslabs | 1 year ago | 2,470 views 8:51 Google I/O 2011: Compliance and Security in the Cloud Michael Manoochehri Learn what you need to know to succeed as a Google Apps VAR or customer in the areas of identity management, data migration ... by GoogleDevelopers | 3 months ago | 1,747 views 50:26 HD CC Send secure SMS messages with CellTrust SecureSMS Appliance secure sms hipaa fips sarbox compliant track return receipt tutorial mobile applications gateway text message messaging security banking ... by celltrust | 10 months ago | 428 views 1:20 HD Care Notes Online " "medical record" "home health" "home health notes" HIPAA "smart phone" "cell phone" "browser based" "browser-based care notes" "home ... by marilyngard1 | 1 month ago | 25 views 4:56 HD Famhost - JaRay - Linkwriter - GPS Window Login Process http://www.youtube.com/results?search_query=Mobile+phone+hipaa+security&aq=f Page 1 of 3 TigerText Pro: HIPAA Compliant Text Messaging for iPhones, Androids and Blackberries PLUS: 3 pages of resources from YouTube 13
  • 21. RICKS ’S T LS VAL TOO & For Computer Security: Sophos is the Winner- Swept the Competition in Europe this Month For Secure Correspondence with Clients: The Winner is Privacy Data Systems 14

Notas del editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n