FOR HOME CARE &

fearlessquickMobile - Wireless

Dec 12, 2013 (3 years and 11 months ago)

51 views

OKLAHOMA
ASSOCIATION

FOR HOME CARE &
HOSPICE

Innovative Technology Symposium

2012

HOME HEALTH TECH
SOLUTIONS AND
SECURITY

Presented By:

James B Eggert

MOBILE TECHNOLOGIES

Welcome To Home Health Tech

MOBILE DEVICES


Laptop/Notebook


Netbook


PDA


Smart Phone and/or iPhone



Tablet PC

TABLET PC: NOTABLE SPECS


Screen Size


Touch, Stylus, or Both


WIFI &/or Cellular


Keyboard Type


Camera


OS Platform


Durability


Battery


Performance Specs

TABLET PC: OPERATING
SYSTEMS


Microsoft Windows


Apple
iOS


Android


Linux (very rare)

TABLET PC:
PERFORMANCE SPECS


Processor


Memory (RAM)


Storage (Hard Drive)


Size (almost irrelevant)


Speed

o
5400 RPM

o
7200 RPM


Solid State

TABLET PC:
CONNECTIVITY


Hard Wired Ethernet (use when necessary and available)


WIFI


WIFI controller built
-
in to almost all mobile devices


Requires close proximity to a WIFI router or access point


Available in many restaurants, hotels, public places, and sometimes private homes


May require a password or key to access


Cellular Broadband


GSM, 3G, 4G/LTE, and others


Requires cellular broadband receiver


Some mobile devices have a built
-
in controller


If not, you may be able to use mobile phone as hotspot or tethered receiver


Requires paid cellular plan with local carrier

TABLET PC:
CONNECTIVITY PLATFORMS


Field Mode & Sync with Server


No WIFI or cellular required


No worries about loss of signal or connectivity


Need to re
-
attach to home network regularly


Inconvenient & cumbersome


Compatible platforms required


Data corruption susceptible


Live/Real
-
Time Always
-
On Connection


Requires constant and reliable source of WIFI and/or cellular connection


Risk of lost data or slow response



(continued…)

TABLET PC:
CONNECTIVITY PLATFORMS


Live/Real
-
Time Always
-
On Connection



(…continued)


Data always in
-
sync and up
-
to
-
date


Compatible platforms required


Efficient and productive (when good signal is available)


Live Virtual or Remote Desktop Connection


Requires constant and reliable source of WIFI and/or cellular connection


Fast response and no risk of data loss or corruption


Data always in
-
sync and
up
-
to
-
date


Efficient and productive (when signal is good)


Various and multiple platforms work together

TABLETS TO REVIEW


iPad


Asus Netbook T101MT Swivel


Asus
Eee

Pad Slider SL101


Asus B121
-
A1
EeePad


Samsung Galaxy Tab


Samsung Series 7 Slate PC


Panasonic
ToughPad

A1


Panasonic
ToughBook

H2

The New
iPad

Screen: 9.7” Touch Extreme Resolution

Wireless: WIFI
-
n & 4G LTE Cellular

Keyboard: Add
-
On

Camera: Yes

Platform: Mac
iOS

Battery: <10 Hours

CPU & RAM: A5X

HDD: Up to 64GB SSD

Price: $499 and Up

Asus Netbook T101MT

Screen: 10.1” Swivel Touch w/ Stylus

Wireless: WIFI
-
n

Keyboard: Built
-
In w/ Touchpad

Camera: Yes

Platform: MS Windows 7 Pro

Battery: <6.5 Hours

CPU & RAM: Atom N570, 2GB

HDD: 320 5400RPM

Price:
Approx

$780

Asus
Eee

Pad Slider SL101

Screen: 10.1” Gorilla Multi
-
Touch

Wireless: WIFI
-
n

Keyboard: Built
-
In Slider

Camera: Front & Rear

Platform: Android 4.0

Battery: <8 Hours

CPU & RAM:
Tegra

Dual
-
Core, 1GB

HDD: 16GB or 32GB SSD

Price:
Approx

$650

Asus B121
-
A1
EeePad

Screen: 12.1” Gorilla Touch w/ Stylus

Wireless: WIFI
-
n

Keyboard: Add
-
On

Camera: Yes

Platform: MS Windows 7 Pro

Battery: <4.5 Hours

CPU & RAM: Intel Core i5,
4
GB

HDD: 64GB SSD

Price:
Approx

$1,550

Samsung Galaxy Tab

Screen: 7.7” Multi
-
Touch

Wireless: 4G LTE

Keyboard: Add
-
On

Camera: Front & Rear

Platform: Android 3.2 Honeycomb

Battery: <13 Hours

CPU & RAM: 1.4GHz Dual
-
Core, 16GB

HDD: 32GB + SD Card

Price:
Approx

$550

Samsung Series 7 Slate PC

Screen: 11.6” Multi
-
Touch w/ Stylus

Wireless: WIFI
-
n & 3G

Keyboard: Add
-
On

Camera: Front & Rear

Platform: MS Windows 8

Battery: (no specs offered !?!)

CPU & RAM: Intel Core i5, 4GB

HDD: 128GB SSD

Price:
Approx

$1,350

Panasonic
ToughPad

A1

Screen: 10.1” Multi
-
Touch w/ Stylus

Wireless: WIFI
-
n & 4G LTE

Keyboard: On
-
Screen Only

Camera: Front & Rear

Platform: Android 3.2

Battery: Long
-
Life Li
-
Ion

CPU & RAM: 1.2GHz Dual
-
Core,
1
GB

HDD: 16GB Flash

Very
-
High Durability

Price:
Approx

$2,100

Panasonic Toughbook H2

Screen: 10.1” Dual
-
Touch w/ Stylus

Wireless: WIFI
-
n & 3G or 4G LTE

Keyboard: On
-
Screen Only

Camera: Yes

Platform: MS Windows 7 Pro

Battery: Long
-
Life Dual Hot Swap

CPU & RAM: Intel Core i5, 4GB

HDD: 320GB 7200 or 128GB SSD

Extreme Durability

Price:
Approx

$3,900

OTHER BRANDS TO CHECK OUT


Acer


Dell


Fujitsu


Lenovo


Toshiba


NETWORK SECURITY

Thanks for attending! Up Next:

NETWORK SECURITY TOPICS


Hackers & Other Cyber Thugs


Viruses & ETDs


Routers & Firewalls


Servers & Passwords


Privacy & HIPPAA Compliance Tips

HACKERS & CYBER THUGS


Who are they?


Where are they?


Why do they do it?


How am I vulnerable?


What can I do to protect myself?

HACKERS: WHO ARE THEY?


Entrepreneurs


Geniuses


From all walks of life


Programmers


Thieves


Too smart for their own good,

with a computer & internet connection!




HACKERS: WHERE ARE THEY?


Next Door


College Campuses


Living with Mom & Dad


Overseas


China


Russia


Third World Countries

HACKERS: WHY DO THEY DO IT?


They are bored


They consider it a challenge


They want to create chaos


They want to make money



HACKERS: HOW AM I VULNERABLE?


Open Internet Connections


No Router or Firewall


Direct Connection


Weak Passwords


Unsecured WIFI


Open Shares


Open Ports


Especially RDC/Terminal Services!


Email Servers

HACKERS: WHAT CAN I DO?


Knowing is half the battle!


Methods are always changing: Be Vigilant


Get a router


Set a stronger password


Password protect important or sensitive data


Get help!


Close open ports


Setup routers


Etc…




VIRUSES & ETDS


Most are developed by hackers


Anti
-
Virus programs are good, but can’t always help you


It’s fairly easy to protect yourself, as long as you know what to do:


BE CAREFUL WHAT YOU CLICK ON!


Make sure you can trust websites you are visiting


If they are “trying too hard” to get a click


don’t do it


Don’t trust official
-
looking anti
-
virus warnings


Be aware of your AV brand


If it’s asking for money, be VERY careful


Just because it says “Microsoft, doesn’t mean it’s legit” (or Adobe, etc…)


Viruses can’t run unless you give permission or access

ROUTERS & FIREWALLS


Any router is better than nothing


Almost any router will provide basic protection from most attacks


Router VS Firewall


Router is usually simply a device for connecting computers and sharing internet and
network resources


Most routers have at least some firewall functionality built in


A firewall is a must more advanced version of a router which actively inspects network and
internet traffic for potential problems


Routers and Firewalls cannot always protect from viruses


Some firewalls can inspect files for malicious content


Must always be updated and relevant for current attacks


Hackers use viruses (especially Trojans) to get access thru firewalls


Most Important


routers/firewalls manage ports and traffic


SERVERS & PASSWORDS


Check servers for open ports


RDC 3389; Email 110, 25; FTP 21, Telnet 23


Check for unused or unknown Admin accounts


Know what all accounts are for


remove others


Check all accounts for remote access


Double
-
Lock policy for sensitive programs or resources


Set multiple authentication points


Use different passwords!


Test for vulnerabilities (you may need help with this

(continued…)

SERVERS & PASSWORDS

(…continued)


Establish
an organization wide password policy


Ensure strong password for anyone who has access to critical or
sensitive data


Seven characters or more


Upper & Lower case letters


Numbers & letters


Special characters


Random as possible


Change passwords often


PRIVACY & HIPPAA COMPLIANCE


Disclaimer



Concerns


Patient records on mobile devices


Unauthorized access to privileged servers or workstations


Be careful of others standing too close


may be able to read sensitive patient data


Theft of devices or other hardware with data stored locally


Tips


Passwords! Or use biometric authentication


Consider encrypting Storage Devices


Thoroughly destroy residual data on old hardware after upgrades,
etc


THE END

Thank you for attending!