Enterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door.
Contact-tracing solutions are often talked about as a COVID-19 response strategy for enterprises as they resume travel and continue business operations. In defining a digital contact tracing strategy, enterprises must decide whether or not they even need one distinct from efforts undertaken by local health authorities. Learn here how to implement a digital contact-tracing strategy, as well as how to sort through the large volume of options when it comes to contact tracing to determine what makes the most sense for your security team and your organization.
This article discusses extremism in the United States as we close out 2020 and look to 2021. Security professionals can educate themselves on what extremist groups are out there and where the risks lie.
With mobile usage a dominant channel going forward, authentication techniques need to move beyond two steps forward for authentication and one step backward for user experience. Just as passwords are being discarded because of the high friction they create for users, new multi-factor authentication techniques are moving in.
With the growing adoption of connected solutions like telehealth come heightened security risks. How can healthcare organizations best balance protection, innovation, and patient care? Recognizing the increasingly interconnected nature of IT infrastructure, and incorporating security into product design, is a start.
For most of their existence, the focus of elevator improvements has been on cost and efficiency. While those are still important, new technologies are closing the gap in current building security processes by putting the focus on vertical transportation.
As increasingly sophisticated cyberattacks continue to target healthcare’s essential systems - including networks, IoT medical instruments, and mobile devices - the need for advanced security protections continues to grow. Healthcare leaders are beginning to embrace the truth: cybersecurity is now an indispensable part of patient care.
Yet even as this move toward secure connected technologies expands, a favorite target of malicious actors continues to be the healthcare organization’s website - especially if the site is powered by WordPress.
Veterans have a lot of offer potential security roles and bring many intangibles to the table. Here are some tips that may help guide the hiring conversation and help envision where a veteran can help your company.
During the week of October 25, 2020, the UVM Health Network experienced a confirmed cyberattack affecting some systems. Despite standby procedures in place to continue providing safe care, the attack caused variable impacts on services at affiliate organizations.
Willapa Medical Clinic in South Bend, Wash., was looking for a solution to speed up registration and smooth out the check-in process at the office, helping to limit COVID-19 exposure as much as possible. Before implementing the touchless solution, the Clinic's staff was reaching through the registration window to take everyone's temperature with a tympanic thermometer.