Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Sectors » Hospitals & Medical Centers

Hospitals & Medical Centers
Hospitals & Medical Centers RSS Feed RSS

Working with PIAM for Hospital Safety

Ajay Jain
September 9, 2014
The rise in violent incidents sweeping through our country – and around the world – has organizations across all industries looking for new and more effective ways to control access in order to better protect and secure people and premises. One of the areas most affected by these incidents is the healthcare industry.
Read More

7 Benefits to Standardizing Healthcare Security

Ken Bukowski
August 26, 2014
Standardization of healthcare protocols and procedures is an established practice that helps create a safer and more affordable patient culture.
Read More

4.5 Million Patients' Data Stolen from Healthcare System

August 18, 2014

Community Health Systems, which operates 206 hospitals around the U.S., announced today that in a recent data breach hackers stole data on 4.5 million patients, including names, Social Security numbers, addresses, birthdays and telephone numbers. The hackers did not steal information about patients’ medical histories, clinical operations or credit cards.


Read More

Survey Reveals Violence in Hospitals A Growing Public Health Concern

June 12, 2014

According to the 2014 Healthcare Crime Survey, commissioned by the International Association of Healthcare Security and Safety Foundation (IHSSFoundation), heavy violent crimes have spiraled up from 2012 to 2013.


Read More

California Considers Bill Requiring Hospital Violence Prevention Plans

May 11, 2014

California Senator Alex Padilla has introduced a bill to address violence against workers at hospitals and health facilities.


Read More

Facilitating Better Healing with Visitor-Friendly Security

Being near family, surrounded by familiar and caring people, can help patients heal better and faster.
Claire Meyer
May 1, 2014

Badges are constructed to meet HIPAA, privacy and civil rights concerns – visitors’ last names are not included on badges, and generic room numbers are used as destination markers instead of departments (for example, badges declaring a destination of the “infectious disease” department).


Read More

Managing Security for Emergency Departments with High-Risk Patients

Hospital Emergency Departments are a truly unique environment.
May 1, 2014

Due to a number of complex issues which often include a lack of available dedicated psychiatric department beds, a growing population of persons with behavioral disorders and a decreased availability of treatment options due to budget reductions, boarding times of psychiatric or behavioral health patients has skyrocketed in recent years.


Read More

Unsecured Medical Equipment Provides Wider Attack Base

The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices leaves enterprises open for cyber attacks.
March 1, 2014

The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices – not just laptops but medical equipment, printers and surveillance cameras – leaves enterprises open for cyber attacks.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More

Accounting for Local Hospitals in Emergency Preparedness

Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
Dean C. Alexander
March 1, 2014

Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.


Read More
Previous 1 2 … 45 46 47 48 49 50 51 52 53 … 57 58 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing