The Prescription for Curing ID Badge Ills

The Prescription for Curing ID Badge Ills

Increased control and advanced reporting are critical for a safe facility

The Prescription for Curing ID Badge IllsMany hospitals are finding it necessary to increase the number of access controlled openings in their facilities. Whether it’s due to increased violence, additional privacy requirements or emergency preparedness, they are finding the need for increased control and advanced reporting a critical part of keeping their facilities safe. Parallel to this increased security is the need for more advanced credentials to ensure the data being exchanged with every transaction is secure.

In addition, a major value proposition for hospitals is to provide convenient and efficient tools for their staff, especially their doctors. Since physicians often work in several locations, with each typically having a different type of access control system, they are usually forced to obtain, carry and use a different credential at each hospital and clinic. Sometimes, they even need multiple credentials for one location. Ask a doctor what type of credential they would prefer to use and, in loud unity, they would reply, “none.”

Healthcare organizations want to work with their physicians and staff to achieve the right balance between security and convenience. Most of them don’t realize how easy that has actually become.

Credentials Are Getting Smart

There are a lot of credential choices out there, but it’s important that healthcare organizations do their homework and choose wisely. What might have been standard technology in the past, may no longer provide them with the functionality and security they will need in the future. With the advent of smart and mobile credentials, the choice made now may not only affect access control applications, but many other aspects of daily life in a healthcare environment.

Smart credentials provide healthcare organizations with a superior solution over other card products at approximately the same price as a proximity card. Smart cards increase the security of data and provide added convenience to the user. In addition, smart credentials allow for greater functionality by allowing users to use them for access control, logical access, payments and many other functions.

By considering open architecture capabilities, hospitals can easily provide secure access for staff to more applications and add value to the many proprietary systems currently in the marketplace.

Saying that a smart card is open architecture means that it is capable of accepting customized keys for multiple, diversified applications, regardless of whose application it is. This lets hospitals add applications on their own terms, expanding as slowly or as quickly as they like. Also, with memory options of 2K, 4K and 8K bytes, hospitals can get the memory they need, without paying for extra memory they don’t.

As Near Field Communication (NFC) technology is being added to a growing number of mobile handsets to enable access control and many other applications, more and more organizations, including healthcare, are considering joining the bring your own device (BYOD) trend and having staff members use their own smart phones as their access control credentials.

To turn NFC-enabled smartphones into an access control credential, users simply download an app to their smartphone. Then, their access control administrator uses the cloud service to send a secure mobile credential directly to the user’s phone. Once the mobile credential is downloaded, users open the app and tap their smart phone to the reader in the same way they use a card or fob.

For many employees, including doctors, using their personal smart phone would be much easier than searching for a card. While a doctor could use a personal smart phone to get into the various facilities served, the IT staff would have the confidence that the data is being exchanged is encrypted and secure. Healthcare organizations may want to start off using smart phones with their doctors only and later migrate their use with the rest of the staff, providing a choice of credentials that could be used.

BYOD is Becoming a Reality Everywhere

Each and every day, hospital staff are finding it easier to bring and use their personal devices to work in the hospital. Of course, this is a double-edged sword. Employees get to work on devices that they like and that are probably more advanced than what is issued to them through their IT department. Plus, instead of carrying around a variety of equipment, they get to choose the one device that works best for them.

Although employees may wish to use their own device, IT teams need to ensure the security/encryption, which is needed for patient and organizational information, is strong, implementation is seamless, and management of software/applications for all of these personal devices doesn’t add vulnerability to the enterprise. IT professionals want strong authentication credentials, the level of security provided by smart credentials.

Unlike proximity and magnetic stripe cards and their readers, smart credentials initiate a challenge and response sequence to initiate conversations with the network. These communications are encrypted using industry standard encryption techniques. By welcoming their involvement and showing the ability to speak their language and answer their questions, you will gain additional layers of approval within the IT organization.

In today’s world, a smartphone can act just like a smart card and can be used for access control and payments, simply extending the functionality of the phone. Any smart phone owner already sees this happening in their everyday life, using their phone for multiple purposes, from game playing or paying for coffee to important work-related tasks. Today, college students and their campus card administrators are using their phones to access their access control systems and pay for meals, laundry services and more.

While the BYOD migration moves forward, there will be a mixed environment of cards and phones. With more and more NFC-enabled phones coming on the market, the shift to phones being used by the majority of people on a healthcare campus will ultimately follow.

People prefer the convenience of using their phones instead of digging for their
cards. Administrators find that using smart phones as badges saves time that can
be better spent on other issues. Assigning the credential to a phone takes less work
than printing and delivering a badge.

What Healthcare Facilities Can Do Now

For those facilities already using aptiQ multi-technology readers, there is no need to
replace readers in order to migrate to smart cards, smart phones or a combination of
the two. These readers currently work with magnetic stripe, proximity and smart cards
as well as NFC-enabled mobile phone credentials all in one reader, providing an easy
migration path to upgrade credentials between any of those versions at their own pace.

If non-smart access technology is being used today, multi-technology readers
should still be installed to help ease future transitions by reading the different types of cards and smart phones at the same time.

Organizations wanting to use NFCenabled
smartphones as their access
control credentials can begin the transition
now. The recently introduced aptiQmobile
secure peer-to-peer (P2P) NFC
mode lets organizations provide the convenience
of using a mobile device today.

This secure peer-to-peer solution
provides several advantages. It lets organizations
implement mobile credentials
ahead of the market by using Android
NFC-enabled phones and Apple iPhones
with a special case that enables NFC regardless
of choice of carriers. But, for
many, its most important advantage is
that it lets healthcare facilities provide
their physicians and staff a convenient
credential that is easy to use for access
control and many other applications.

It is important that healthcare organizations
be prepared for smart card
and NFC mobile credentials, even if
that facility wants to still use proximity,
magnetic stripe or keypad technology at
present. If new readers are needed, they
should select multi-technology readers
that combine the ability to read all of
these credential technologies in a single
unit. That way, when the organization
switches over to smart credentials,
there will be no reason to tear out the
old readers to install smart card readers.
During the transition, the facility can
use both their old magnetic stripe and
proximity credentials
and the new smart credentials.

This article originally appeared in the June 2014 issue of Security Today.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”