The Prescription for Curing ID Badge Ills

The Prescription for Curing ID Badge Ills

Increased control and advanced reporting are critical for a safe facility

The Prescription for Curing ID Badge IllsMany hospitals are finding it necessary to increase the number of access controlled openings in their facilities. Whether it’s due to increased violence, additional privacy requirements or emergency preparedness, they are finding the need for increased control and advanced reporting a critical part of keeping their facilities safe. Parallel to this increased security is the need for more advanced credentials to ensure the data being exchanged with every transaction is secure.

In addition, a major value proposition for hospitals is to provide convenient and efficient tools for their staff, especially their doctors. Since physicians often work in several locations, with each typically having a different type of access control system, they are usually forced to obtain, carry and use a different credential at each hospital and clinic. Sometimes, they even need multiple credentials for one location. Ask a doctor what type of credential they would prefer to use and, in loud unity, they would reply, “none.”

Healthcare organizations want to work with their physicians and staff to achieve the right balance between security and convenience. Most of them don’t realize how easy that has actually become.

Credentials Are Getting Smart

There are a lot of credential choices out there, but it’s important that healthcare organizations do their homework and choose wisely. What might have been standard technology in the past, may no longer provide them with the functionality and security they will need in the future. With the advent of smart and mobile credentials, the choice made now may not only affect access control applications, but many other aspects of daily life in a healthcare environment.

Smart credentials provide healthcare organizations with a superior solution over other card products at approximately the same price as a proximity card. Smart cards increase the security of data and provide added convenience to the user. In addition, smart credentials allow for greater functionality by allowing users to use them for access control, logical access, payments and many other functions.

By considering open architecture capabilities, hospitals can easily provide secure access for staff to more applications and add value to the many proprietary systems currently in the marketplace.

Saying that a smart card is open architecture means that it is capable of accepting customized keys for multiple, diversified applications, regardless of whose application it is. This lets hospitals add applications on their own terms, expanding as slowly or as quickly as they like. Also, with memory options of 2K, 4K and 8K bytes, hospitals can get the memory they need, without paying for extra memory they don’t.

As Near Field Communication (NFC) technology is being added to a growing number of mobile handsets to enable access control and many other applications, more and more organizations, including healthcare, are considering joining the bring your own device (BYOD) trend and having staff members use their own smart phones as their access control credentials.

To turn NFC-enabled smartphones into an access control credential, users simply download an app to their smartphone. Then, their access control administrator uses the cloud service to send a secure mobile credential directly to the user’s phone. Once the mobile credential is downloaded, users open the app and tap their smart phone to the reader in the same way they use a card or fob.

For many employees, including doctors, using their personal smart phone would be much easier than searching for a card. While a doctor could use a personal smart phone to get into the various facilities served, the IT staff would have the confidence that the data is being exchanged is encrypted and secure. Healthcare organizations may want to start off using smart phones with their doctors only and later migrate their use with the rest of the staff, providing a choice of credentials that could be used.

BYOD is Becoming a Reality Everywhere

Each and every day, hospital staff are finding it easier to bring and use their personal devices to work in the hospital. Of course, this is a double-edged sword. Employees get to work on devices that they like and that are probably more advanced than what is issued to them through their IT department. Plus, instead of carrying around a variety of equipment, they get to choose the one device that works best for them.

Although employees may wish to use their own device, IT teams need to ensure the security/encryption, which is needed for patient and organizational information, is strong, implementation is seamless, and management of software/applications for all of these personal devices doesn’t add vulnerability to the enterprise. IT professionals want strong authentication credentials, the level of security provided by smart credentials.

Unlike proximity and magnetic stripe cards and their readers, smart credentials initiate a challenge and response sequence to initiate conversations with the network. These communications are encrypted using industry standard encryption techniques. By welcoming their involvement and showing the ability to speak their language and answer their questions, you will gain additional layers of approval within the IT organization.

In today’s world, a smartphone can act just like a smart card and can be used for access control and payments, simply extending the functionality of the phone. Any smart phone owner already sees this happening in their everyday life, using their phone for multiple purposes, from game playing or paying for coffee to important work-related tasks. Today, college students and their campus card administrators are using their phones to access their access control systems and pay for meals, laundry services and more.

While the BYOD migration moves forward, there will be a mixed environment of cards and phones. With more and more NFC-enabled phones coming on the market, the shift to phones being used by the majority of people on a healthcare campus will ultimately follow.

People prefer the convenience of using their phones instead of digging for their
cards. Administrators find that using smart phones as badges saves time that can
be better spent on other issues. Assigning the credential to a phone takes less work
than printing and delivering a badge.

What Healthcare Facilities Can Do Now

For those facilities already using aptiQ multi-technology readers, there is no need to
replace readers in order to migrate to smart cards, smart phones or a combination of
the two. These readers currently work with magnetic stripe, proximity and smart cards
as well as NFC-enabled mobile phone credentials all in one reader, providing an easy
migration path to upgrade credentials between any of those versions at their own pace.

If non-smart access technology is being used today, multi-technology readers
should still be installed to help ease future transitions by reading the different types of cards and smart phones at the same time.

Organizations wanting to use NFCenabled
smartphones as their access
control credentials can begin the transition
now. The recently introduced aptiQmobile
secure peer-to-peer (P2P) NFC
mode lets organizations provide the convenience
of using a mobile device today.

This secure peer-to-peer solution
provides several advantages. It lets organizations
implement mobile credentials
ahead of the market by using Android
NFC-enabled phones and Apple iPhones
with a special case that enables NFC regardless
of choice of carriers. But, for
many, its most important advantage is
that it lets healthcare facilities provide
their physicians and staff a convenient
credential that is easy to use for access
control and many other applications.

It is important that healthcare organizations
be prepared for smart card
and NFC mobile credentials, even if
that facility wants to still use proximity,
magnetic stripe or keypad technology at
present. If new readers are needed, they
should select multi-technology readers
that combine the ability to read all of
these credential technologies in a single
unit. That way, when the organization
switches over to smart credentials,
there will be no reason to tear out the
old readers to install smart card readers.
During the transition, the facility can
use both their old magnetic stripe and
proximity credentials
and the new smart credentials.

This article originally appeared in the June 2014 issue of Security Today.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3