Hospital Security


The Picture of Health

Thieves are everywhere, and doctors' offices are no exception. Prescription drugs, medical supplies and good, old-fashioned money can all be targets of unscrupulous patients or employees. Surveillance to prevent these crimes, though, can be a tricky task because patients have a legal expectation of privacy. So what's a doc to do?

Indigo Identityware Announces Biometric Authentication for Healthcare

MorphoTrak’s biometric technology combined with Indigo’s proprietary Identity and Access Management solution will ensure healthcare providers seamless access each time they authenticate into their desktop and electronic medical records system.

Notifier Fire Alarms Seismic-certified and In-use

A California hospital receives seismic-certified fire alarm transplant.

UK Hospital Deploys DVTel Video Management System

DVTel Inc. recently announced that the Great Ormond Street Hospital, London, UK, has selected DVTel from among eight video management software providers as the central platform for a newly-upgraded IP video management system.

Confronting Violence Health Care Workplace Violence

Most people think of hospitals as places for healing. But the threat of violence -- which can take many forms -- can be a daily reality for nurses and other health care workers, creating a compelling need to properly address the issue.

Duane DeCouteau Joins Jericho Systems as Software Managing Director

He will lead product development for Jericho’s EnterSpace Decisioning Service and will ensure that it continues to align with both industry standards and the needs of Jericho’s major clients such as the Department of Veteran’s Affairs and the Department of Defense.

Ingersoll Rand Partners with CNL Software's PSIM on Healthcare Solutions

Under the terms of the agreement, Ingersoll Rand will license a private-label version of CNL’s IPSecurityCenter, a software-based integration and management platform customized specifically for the healthcare market.

machine gun

School Shooting Changed Police Response Tactics

After the school shootings at Columbine High School in 1999, police had to re-think their strategies in dealing with active shooters. That killing spree changed the way law enforcement approaches armed killers.



ADT Commercial Opens Showcase Facility to Demonstrate Networked Solutions to Customers

Located within ADT’s flagship customer monitoring center, the 6,500-square-foot ISC has three vertical market showrooms.

Pharmacies Fend Off Drug Thieves

Today’s thief may not be the bank robber of yesterday. While there are still plenty of banks getting hit, it’s now drug thieves working the pharmacies that have law enforcement concerned.

Microsoft Selects PhoneFactor to Provide Multi-Factor Security for HealthVault

PhoneFactor’s multi-factor authentication service has been integrated with Microsoft HealthVault, an online service designed to put consumers in control of their personal health information. HealthVault users can now benefit from an extra layer of security when signing into the service, further protecting their privacy and preventing identity theft and fraud.

Healthcare Network Migrates to Contactless, Multi-application Access Control

HID Global has enabled the Albert Einstein Healthcare Network (AEHN) to re-badge more than 7,000 personnel following the firm’s spin-off and corporate re-branding, while also migrating to higher-security 13.56 MHz contactless technologies.

Report Examines Privacy, Security Risks in Patient Health Data

A new report, "Privacy and Security in Health Care: A Fresh Look," released by the Deloitte Center for Health Solutions, identifies the risks associated with privacy and security breaches in healthcare. The report offers guidance to help minimize potential privacy and security threats as health reform drives increased exchange of online health information.

Fujitsu Appoints Charles Yanak as Dir. of Product Management and Partner Development

Yanak will report directly to Christer Bergman, vice president of Fujitsu’s biometric solutions, who joined the company in December.

Mobile Active Defense Partners with MainNerve on Healthcare Smartphone Security

Mobile Application Development (M.A.D.) Partners LLC and MainNerve are collaborating to provide iPhone, iPad and smartphone security and compliance to the critical healthcare sector.

HID Appoints Jason Walden to Push RFID Growth Across Europe

Walden will be responsible for extending HID’s leadership in RFID tagging into the rapidly growing market for solutions that support asset-tracking, process automation, medical processes and identification of returnable transport items.

New Jersey Hospital To Use AMAG Technology’s Symmetry Security Management System

Capital Health, a provider of advanced medicine in New Jersey, has chosen to install AMAG Technology’s Symmetry Security Management System at its new hospital in Hopewell Township, N.J.

IdentiSys Appoints Darlene Swan to Oversee Marketing Expansion

Darlene Swan will be a key member of the IdentiSys marketing team, reporting to IdentiSys Vice President of Sales and Marketing, Joe Wright.

RF Technologies Promotes Paul Larson to Vice President of Product Development

Larson is responsible for leading all phases of RF Technologies' product development initiatives including: gathering, translating and conceptualizing the voice of the customer; developing the product roadmap; leading new product engineering; directing sustaining engineering support for existing products and product line extensions; and managing internal and external technical education program leaders.

Defentect Group Begins Installation at Major Northeastern Medical Facility

Defentect's Gammatect sensors, which are equipped to communicate with the company's proprietary DM3 technology, are being placed at key access points on the hospital campus.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.