Hospitals & Medical Centers

Working with PIAM for Hospital Safety

The rise in violent incidents sweeping through our country – and around the world – has organizations across all industries looking for new and more effective ways to control access in order to better protect and secure people and premises. One of the areas most affected by these incidents is the healthcare industry.
Read More

4.5 Million Patients' Data Stolen from Healthcare System

Community Health Systems, which operates 206 hospitals around the U.S., announced today that in a recent data breach hackers stole data on 4.5 million patients, including names, Social Security numbers, addresses, birthdays and telephone numbers. The hackers did not steal information about patients’ medical histories, clinical operations or credit cards.


Read More

Facilitating Better Healing with Visitor-Friendly Security

Being near family, surrounded by familiar and caring people, can help patients heal better and faster.

Badges are constructed to meet HIPAA, privacy and civil rights concerns – visitors’ last names are not included on badges, and generic room numbers are used as destination markers instead of departments (for example, badges declaring a destination of the “infectious disease” department).


Read More

Managing Security for Emergency Departments with High-Risk Patients

Hospital Emergency Departments are a truly unique environment.

Due to a number of complex issues which often include a lack of available dedicated psychiatric department beds, a growing population of persons with behavioral disorders and a decreased availability of treatment options due to budget reductions, boarding times of psychiatric or behavioral health patients has skyrocketed in recent years.


Read More

Unsecured Medical Equipment Provides Wider Attack Base

The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices leaves enterprises open for cyber attacks.

The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices – not just laptops but medical equipment, printers and surveillance cameras – leaves enterprises open for cyber attacks.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More

Accounting for Local Hospitals in Emergency Preparedness

Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.

Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.