SNM 2009 Abstract: Computer Gadgets and Hacks

Embed Size (px)

DESCRIPTION

Computer Gadgets and Hacks for the Nuclear Medicine Professional, an oral presentation given at the Society of Nuclear Medicine's 2009 Annual Meeting held in Toronto, Canada. How to setup a teleradiology program, get online CME, and educate your staff

Citation preview

  • 1. Thomas F. Heston, MD protect your data, setup a teleradiology network, and customize your Internet CME Computer Gadgets and Hacks for the Nuclear Medicine Professional

2. Protecting YourData 3. Even Top Institutions are Vulnerable 4. Internet Safety You cannot trust the Internet. You can only grow to respect it and understand its inherent problems and learn some basic common solutions. Black Hat: Misfits Criminals, and Scammers 5. Secure Your Data

  • Never give out all of your secrets

6. Redundancy

  • put up multiple barriers

7. encryption and password protection Monitor breaches

  • record intrusions into your system

8. have regular HIPAA meetings for TQI 9. Principles

  • Encrypt everything
  • Email is not secure unless encrypted

10. Resource to encrypt email:PGP pretty good privacy 11. Encrypt data before storing online Limit what is available online 12. Don't create a centralized data center where a single break-in releases a flood of data 13. Safety Tools

  • Password protection
  • Roboform- passwordsandusernames

14. Saves hours and hours of time Server protection

  • Advanced Policy Firewall- monitoring and real-time updating of unix IP tables

15. Hardware FirewallsData protection: encryption 16. How to Setup a Simple Teleradiology Program 17. Disclaimer: you are responsible for HIPAA compliance. This is an example only and does not cover data security methods in depth. 18. VPN vs Bouncing

  • VPN
  • creates a tunnel within the Internet

19. allows access to entire database 20. typical for large clinics or hospitals Bouncing

  • encrypted data pushed to a server

21. encrypted data then pulled off of server 22. database stored offline 23. less expensive and possibly more secure for small programs 24. VPN Tunnel 1. Push Encrypted Data for One to Just a Few Patients 3. Pull Encrypted Data note: main database is storedoffline entire database always available via the Internet VPN vs Bouncing 2. Bounce Data off DedicatedServer 25. VPN vs Setting up aDedicated Server

  • VPN
  • complex and expensive

26. requires permanent staff to maintain 27. hire someone else to do this Setting up a Dedicated Server

  • do-it-yourself

28. inexpensive 29. may be able to use consultants only 30. Step 1. Get a ProviderWith 24/7 Support MegaSimpleDomains.com 31. Step 2 (Final Step). Get a Unix Assisted Service Plan 32. Personalized Continuing Education 33. Personalized CME

  • iGoogle Gadgets
  • allows you to customize your homepage

34. http://www.igoogle.com WebShots

  • customized personal screensavers

Office Screensavers

  • keeps staff up-to-date with latest news

35. change once from central location 36. Customized Homepages 37. Customized Screensavers 38. Personal TQI 39. Personalized Feedback Loops 40. 41. Contribute Your Expertise 42. Contribute to NuclearWiki.com 43. 44. Thank You!

  • Follow Me Online
    • Twitter:http://Twitter.com/tomheston
  • 45. Facebook:http://profile.to/tomheston

46. MySpace:http://myspace.com/tomheston