From The Editor

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

She writes that trust identities offer the means to accomplish “… objectives through a holistic, end-to-end approach to identity and authentication that spans multi-factor authentication, credential management, digital certificates and physical identity and access management (PIAM).”

As a healthcare professional, Loy is pointing out that healthcare organizations have specific demands that must be met in order to stay compliant and to maintain the integrity of healthcare delivery in a digital world.

Administrators are more connected, and the hospital and its cyber component are now part the efficient means of the Internet of Trusted Things (IoTT).

Packed with valuable information, Loy will address the compliance challenge and opportunity, plus the power of convergence. She also writes about protecting the connected hospital, and how to reduce risk.

While you are thumbing through this issue, please consider data security. Authors Paul Garms and Sean Murphy, both regional marketing directors at Bosch Security and Safety Systems, take a deep dive into the parameters of data security. They start with operating systems, password use, encryption and authentication and port usage. They tie it all up with prevention of denial-of-service, and what are today’s highest standards.

The bottom line is, it is imperative for security experts to consider physical and cybersecurity at the same time. These devices are connected, and there are inherent risks that must be addressed.

This article originally appeared in the September 2018 issue of Security Today.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

Featured Cybersecurity

New Products

  • Videoloft Cloud Video Surveillance VSaaS Solution

    Videoloft Cloud Video Surveillance VSaaS Solution

    Videoloft focuses on transforming traditional professional surveillance systems into cloud connected solutions via the Videoloft Cloud Adapter. 3

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3