140 likes | 287 Views
Preparing to Practice Computers & IT. Presentation by Ofer Shimrat. November 22, 2008. Introduction. Health Insurance Portability & Accountability Act Medical Applications determine your needs Network Architecture & Types of Networks Wired Network or Wireless Network
E N D
Preparing to Practice Computers & IT Presentation by Ofer Shimrat November 22, 2008
Introduction • Health Insurance Portability & Accountability Act • Medical Applications determine your needs • Network Architecture & Types of Networks • Wired Network or Wireless Network • Desktop Hardware & Software Recommendations • Server Hardware & Software Recommendations • Network Hardware & Software Recommendations • Network and Computer Security • Backup Strategies and Disaster Recovery • Insurance to protect your computer assets • Productivity and Feature-Rich Enhancements • Computer Best Practices and Conclusion
HIPAA Compliance • Health Insurance Portability and Accountability Act • Enacted August 21, 1996 • Applies to Health Plans, Providers & Clearinghouses • Protects all “individually identifiable health information” • Mandates patient record privacy in any transaction • Electronic • Paper • Oral • Requires written security standards & procedures • Staff must understand security logic • “Minimum necessary” use & disclosure • Appointment of a security manager • Inventory and catalog all “exposed” IT components • Sanctions for security policy violations • Only as effective as your weakest link
Medical Software Applications • Software determines hardware - Integration • Small or Solo Practice • Medium Size Practice • Large Practice • Electronic Health Record (EHR) or EMR system • Medical management systems • Medical equipment applications • Medical imaging applications • Appointment Scheduling systems • Electronic patient charts & scanning • Billing applications • Office productivity applications • Wireless hardware applications
Less expensive Not scalable Slower No central control More maintenance Fragmented Backup More expensive Scalable Faster Central management Less maintenance Centralized Backup Network Topology Peer-To-Peer Network Client/Server Network
Wired or Wireless • Wired • Faster (10/100/1000/10000 Mbps) • More secure • Always on and connected but more preparation • Professionally installed same time as Telco wiring • Use CAT 5e, CAT 6 or CAT 7 Ethernet cabling • Concentrate to patch panel and label clearly • Wire enough drops for the future office needs • Diagram & document your office wiring • Wireless • Slower (11/22/54/108/125/240 Mbps) • Less secure • May have blind spots but more convenient • Wi-Fi 802.11 a / b / g / n/ i standard • Bluetooth standard • Use encryption with password protection
Server Hardware & Software • The heart of your network & greatest IT asset • Professionally installed/configured/maintained • 64 bit server grade hardware components • Server grade chassis & expansion slots • Redundant power supplies and cooling fans • Redundant Array of Independent Disks (RAID) • Extended warranty & replacement service • MS Windows 2003/2008 Server (various editions) • MS Exchange 2003/2007 (various editions) • MS Small Business Server 2003/2008 (2 editions) • MS Essential Business Server 2008 (2 editions) • Intranet, Internet & Extranet • Remote login, security groups & privileges
Anti-Virus Anti-Spam Anti-Spyware Firewall or UTM SERVER Security Hardware & Software • Firewall or Unified Threat Management (UTM) • Anti-Virus software or hardware equivalent • Anti-Spam software or hardware equivalent • Anti-Spyware software or hardware equivalent • Authenticated user security & passwords • Encryption software or hardware equivalent
Backup & Disaster Recovery • Data as your most important asset • Nightly Backups with verify logs • Full, Differential, Incremental backups • Rotation of backup devices • On-line, On-Site and Off-Site rotation • Recommend external USB/eSATA drives • Backup or Image Backup Software • Volume Shadow Copy • Operational Backups & Restores • Disaster Recovery • Backup, Backup, Backup
Insurance • Inventory & catalog all IT components (HIPAA) • Send copy to Insurance Agent/Head Office • Inland Marine Coverage • Flood Insurance • Filed class and Non-filed class coverage • Business Interruption Coverage • Sprinkler Systems & Smoke Alarms • Theft versus Burglary • User alarm codes and monitoring • Umbrella Policies
Productivity and IT • Communication channels (devices) employed in the organization • The preferred communication method for specific scenarios • The type of information appropriate for each channel (device) • Response time guidelines, base on the communication method • Voice-Mail • E-Mail • Meetings • Memos • Phone calls • Delete It• Do It• Delegate It• Defer It P – Purpose of the communicationA – Action and dues datesS – Supporting documentationS – Summary in subject Adapted from McGhee Productivity Solutions
Conclusion • Be HIPAA compliant • Software determines what hardware • Understand your network topology • Choose hardware with the future in mind • Backup, be secure, redundant & insured Ofer Shimrat TEL: (858) 569-0300 FAX: (858) 569-0303 EML: ofer@soundoffcomputing.com URL: www.soundoffcomputing.com