This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Telehealth was an unexpected technology bright spot in 2020, as the Office for Civil Rights (OCR) relaxed enforcement of certain aspects of HIPAA, helping to reduce COVID exposure via virtual rounding and virtual visits. The following three high-level recommendations provide a basis for defense in depth for healthcare organizations in 2021.
As we look ahead to 2021 and to defending against an ever-evolving variety of exploits and attacks, it’s important to consider the cybersecurity attack vectors that will be most prevalent in the upcoming year.
Enterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door.
Contact-tracing solutions are often talked about as a COVID-19 response strategy for enterprises as they resume travel and continue business operations. In defining a digital contact tracing strategy, enterprises must decide whether or not they even need one distinct from efforts undertaken by local health authorities. Learn here how to implement a digital contact-tracing strategy, as well as how to sort through the large volume of options when it comes to contact tracing to determine what makes the most sense for your security team and your organization.
This article discusses extremism in the United States as we close out 2020 and look to 2021. Security professionals can educate themselves on what extremist groups are out there and where the risks lie.
With mobile usage a dominant channel going forward, authentication techniques need to move beyond two steps forward for authentication and one step backward for user experience. Just as passwords are being discarded because of the high friction they create for users, new multi-factor authentication techniques are moving in.
With the growing adoption of connected solutions like telehealth come heightened security risks. How can healthcare organizations best balance protection, innovation, and patient care? Recognizing the increasingly interconnected nature of IT infrastructure, and incorporating security into product design, is a start.
For most of their existence, the focus of elevator improvements has been on cost and efficiency. While those are still important, new technologies are closing the gap in current building security processes by putting the focus on vertical transportation.
ON DEMAND: Locations that were once considered safe havens such as schools, places of worship and healthcare institutions are no longer immune to acts of violence, and that includes healthcare, such as hospitals, emergency rooms, and facilities that provide healthcare outside of a hospital environment.
ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.
ON DEMAND: Community healthcare facilities have unique security needs and for many organizations, physical security technology and training are new to this space. Security professionals in rural community healthcare clinics have to rely on instinct, behavior monitoring, body language, tone of voice and more to determine risk, deescalate situations and maintain the safety and security of staff, patients and visitors.