From The Editor
Cyber and Security
- By Ralph C. Jensen
- Sep 01, 2018
Challenges come in every form and fashion. The cybersecurity business is no exception.
Our cover story comes from Sheila Loy, who is the director healthcare and
insurance—Identity & Access Management at HID Global.
She writes that trust identities offer the means to accomplish “… objectives through
a holistic, end-to-end approach to identity and authentication that spans multi-factor
authentication, credential management, digital certificates and physical identity and access
management (PIAM).”
As a healthcare professional, Loy is pointing out that healthcare organizations have
specific demands that must be met in order to stay compliant and to maintain the integrity
of healthcare delivery in a digital world.
Administrators are more connected, and the hospital and its cyber component are
now part the efficient means of the Internet of Trusted Things (IoTT).
Packed with valuable information, Loy will address the compliance challenge and opportunity,
plus the power of convergence. She also writes about protecting the connected
hospital, and how to reduce risk.
While you are thumbing through this issue, please consider data
security. Authors Paul Garms and Sean Murphy, both regional marketing
directors at Bosch Security and Safety Systems, take a deep
dive into the parameters of data security. They start with operating
systems, password use, encryption and authentication and port usage.
They tie it all up with prevention of denial-of-service, and
what are today’s highest standards.
The bottom line is, it is imperative for security experts to
consider physical and cybersecurity at the same time. These
devices are connected, and there are inherent risks that
must be addressed.
This article originally appeared in the September 2018 issue of Security Today.
About the Author
Ralph C. Jensen is the Publisher of Security Today magazine.