Hospital Security


Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Key Considerations

Key Considerations

Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.

The Focus on Public Space

The Focus on Public Space

Over the past several years we’ve seen an increase in attacks focused on public spaces. There is no safe-haven in today’s societal landscape that would allow any public service or business to conclude that they are not a target. Hospitals are no exception.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

Curbing the Violence

Curbing the Violence

Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.

Filling the Gap

Filling the Gap

When seconds count in an emergency, such as an active shooter or severe weather, gaps in communication can cost lives. Many schools, businesses and healthcare facilities face the challenge of ensuring comprehensive coverage with their existing emergency mass communication systems.

Best Practices in the Healthcare Industry

Hospitals and medical centers face a number of challenges related to ensuring a safe environment for patients, staff, and visitors.

Providing Access

A Michigan based health care provider that features two main campuses and has dozens of remote and satellite care centers had, for years, deployed a magnetic stripe card-based Galaxy Control Systems access control system integrated, installed and serviced by VidCom Solutions in Lansing.



The Clery Vision

The Clery Vision

Security directors in hospitals and other healthcare settings need to understand pertinent aspects of the Clery Act, and how to partner with colleges and universities to establish, maintain or enhance compliance with this federal law.

Arecont Vision Helps Increase Situational Awareness at Vietnam's Newest Healthcare Facility

First integrated healthcare facility in the country to provide comprehensive healthcare solution employing advanced medical equipment and professional medical staff.

Security-Net Welcomes Three New Member Companies

Combines sixty years of industry experience.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.

A CLEER Path To IP - Modern method of migration from analog to IP

A CLEER Path To IP

For hospitals and critical care facilities, security and access control systems are a key part of the situational awareness and security management platform.

One in Three U.S. Hospitals Report Rise in Violence and Assaults in 2014

Employee turnover rates and low morale attributed to insufficient equipment for officers.

HID Global Shares Top Secure Identity Trends for 2015

Key trends for banks, hospitals, universities and federal agencies, as well as government ID, transportation, enterprise and retail applications.

HID Global's NFC Tag Technology Reduces Fraud in Home Healthcare Market

Integrity caregivers established “proof of presence” by tapping HID Global’s trusted tags with their NFC-enabled smartphone, eliminating opportunities to falsify records.

Xentry Systems Integration and Ascom Partner

Partnership streamlines mission critical healthcare communications for customers.

Advantech's 7" Handheld Pocket Pad Brings Full-size Computing to Mobile Healthcare Applications

Designed especially for use in clinical applications such as EMR, BCMA/CLMA, CPOE, PACS and radiology, is an extension of hospital information system (HIS) and is an ideal PDA.

Hospital Security Breach Steals Data from 4.5 Million Patients

Hospital Security Breach Steals Data from 4.5 Million Patients

Community Health Systems in Central Florida hospitals are affected by the breach

North Shore-LIJ Health System Chooses Perspective by PPM

New incident management system to be implemented across 16 award-winning hospitals.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.