Skip to main content

Posts

Showing posts from 2014

CME credits

In the western countries, I know that many websites exist where the CME credits can be obtained for free. Medscape provides such CME hours for free even for foreign doctors like us which can be obtained at the comfort of one’s residence sitting in front of the computer. Free of cost CMEs should be our top priority. In fact it is not possible for an average middle class doctor to go to distant places taking leave from work and to pay dearly for a couple of CME hours. Also the feasibility of traveling to distant places from rural areas and the discomfort of conducting a journey in overcrowded public transportation of ours should be considered. (Of course, I am not referring to doctors having their own air conditioned vehicle driven by another driver) I would appeal to the medical fraternity to take some positive steps in this regard. My suggestions are the following. 1) MCI should recognize the online CME hours granted by reputed portals like Medscape. 2) The government should

Need for cybersecurity policy

Computer security (also known as cybersecurity or IT security) is information security as applied to computers and computer networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. There are three core principles of cyber security: Confidentiality, Integrity, and Availability. Cybersecurity standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cybersecurity attacks. Although USA, Germany and South Korea have well developed cybersecurity standards, India has none remarkable. The worldwide security technology and services market is forecast to reach $67.2 billion in 2013, up 8.7 percent that in 2012 and we need to brace up for the market demand. The following are a few examples