Created by Alexis Ford Research done by Rebecca Tanner Ford 1.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Implications and Security Issues of the Internet By Neelesh Patel.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
24/7/365 Remote Computer Support. Program Overview.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
One World Real Estate Company Technology Plan. New Computers For the Office Eight 13 inch MacBook Pros and three 27 inch iMac desktop computers Macs are.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
1 Computer Security: Protect your PC and Protect Yourself.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Cloud Storage Maria Evans Tam Huynh Kieu Le Mark Singh.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Cloud Computing. Overview of Technology Accessible Anywhere Anytime.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Lesson 3 Data Storage. Objectives Define data storage Identify the difference between short-term and long-term data storage Understand cloud storage and.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Working in the Cloud. Understand Office 2013 in the CloudUnderstand Office 2013 in the Cloud Work OnlineWork Online Explore SkyDriveExplore SkyDrive Manage.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Introduction TO Network Administration
Computer Security By Duncan Hall.
Membership Competitions FIBA Organizer Information is stored offline, either on a desktop computer or on a Laptop. FIBA Organizer application installed.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Secure Services Shared Hosted MS Exchange 2010.
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Sharing, Thinking, Doing Collaborating In The Cloud How Square 9 Document Management Solutions Make Teamwork Easier.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Office 365 Tools OneDrive and Skype for Business
Transforming PowerPoints with Google Docs
Office 365 is cloud-based productivity, hosted by Microsoft.
Using Office 365 Across All Your Devices
The advantages and the disadvantages of working in the cloud.
Web Application.
People used to install software on their computers
Cloud Storage - an introduction
Store, Share, Sync and Collaborate
Cloud Storage Services
Office 365 Business is your familiar Office in the cloud
A Complete Business Productivity Suite
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Cloud computing.
Lesson 3 Data Storage.
Unit 4 IT Security Kerris Davies.
Online software and backups
BTEC level 3 Learning Aim D.
Tech Terms PLTW Vocabulary Set #6.
Presentation transcript:

Created by Alexis Ford Research done by Rebecca Tanner Ford 1

Topics Of Discussion Cloud Based File Sharing Mobile and Tablet Devices Security Issues with File Sharing Ford 2

Cloud-Based File Sharing Advantages of File Sharing What is it: A program that allows people access and the ability to share the same forms and documents from anywhere Sharing: you have the ability to share many documents with coworkers very easily. Collaboration: allows you to edit and collaborate a single document in a group. Accessibility: the servers can be accessed from any computer, mobile device, or tablet. Recovery: eliminates the possibility of losing storage devices such as flash drives. Security: data is kept in a secure location that cannot be accessed by unauthorized users. Ford 3

4

5

Mobile and Tablet Devices Technology is constantly evolving and incorporating mobile devices and tablets into the work place can be beneficial especially since most people are started to work remotely. Advantages The ability to access their , documents, forms, and insurance product updates whenever they want, wherever they are. The opportunity to show clients different related information to educate them on different policies. Help clients set up automatic payments. Can increase productivity in and out of the office Ford 6

7

The cost for using mobile devices in a business can be very expensive depending on the type of device you pick, but that can be changed if businesses use the BYOD option. Ford 8

BYOD BYOD stands for Bring Your Own Device Having employees bring their own devices to work would cut down the cost of having to purchase devices for all employees. It would also cut the cost and time of having to train each employee on how to use said device. Ford 9

Security Issues with File Sharing Businesses use file sharing to upload data, documents, and other important forms. The potential problem then becomes making sure people like hackers don’t get ahold of it. Not only that, but making sure they don’t put their computers at risks with potential viruses, worms, or Spyware. Ford 10

These risks can be avoided by: Only share with those you know and trust, as well as making sure anyone using your computer or device does the same. Install an anti-virus program such as Norton Internet Security and keep it current. Install, enable, and understand a firewall. Ford 11

When file sharing online, businesses needs to adopt strict rules for employees to use when uploading company information. Employees should only open and share work related items Training can and should be implicated to educate employees what is and isn’t acceptable to share Ford 12

Ford 13