Facility Security


nursing home

More Than 100 Nursing Homes Cut Off From Health Data, Payroll Due to Ransomware Attack

A cyber attack on an IT services provider has had major consequences for nursing homes, some of which may have to close down if they do not gain access to crucial patient data.

healthcare workers

House of Representatives Passes Bill Addressing Violence Against Healthcare Workers

The legislation faces a tough road ahead in the Senate and a potential veto from the Trump administration, which opposes the current version of the bill.

training session

First-Of-Its-Kind Program Will Train Health Professionals to Counsel Patients on Gun Violence Prevention

Gov. Gavin Newsom signed a bill awarding millions of dollars in funding to UC Davis, which will teach healthcare providers intervention techniques for patients.

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

The health organization realized during an investigation of an August breach that its systems had been breached several times prior to the known attack.

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

In the latest ransomware attack scourge, three hospitals in Alabama were able to continue serving existing patients but said they could not take new cases.

“Joker” Premiere Presents Security Concerns For Theater Chains, Local Police

“Joker” Premiere Presents Security Concerns For Theater Chains, Local Police

Moviegoers and the families of victims of the Aurora theater shooting worry that someone could stage a copycat attack during opening weekend.

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

Security researchers found 11 significant vulnerabilities in devices that use the IPnet software, though there are no confirmed incidents involving takeovers of the devices.

Stop at the Point of Contact

Stop at the Point of Contact

The vast majority of discussions involving security and parking areas focus on protecting people and property from vandalism, theft or violent crimes.



Following Shooting, Florida VA Hospital Increases Police Presence and Security Checks

Following Shooting, Florida VA Hospital Increases Police Presence and Security Checks

The hospital where a mentally ill veteran opened fire in an emergency room is also home to a congressional office.

Music Festivals Facing Pressure to Ban Facial Recognition From Venues

Music Festivals Facing Pressure to Ban Facial Recognition From Venues

Several festivals, including Bonnaroo and Austin City Limits, have said publicly that they are not currently using facial recognition at their events.

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

A new investigation discovered that the medical images and health data of more than 5 million patients in the U.S. was readily accessible on the web without a password or login.

Averting Workplace Violence

Averting Workplace Violence

Today’s property manager has many tasks to complete on a daily basis: navigating the ins and outs of the business, ensuring that all processes, systems and personnel are in place to secure their physical assets, and creating a positive environment for tenants and visitors.

The Access Solution

The Access Solution

Providing security, managing budgets, gaining efficiencies— these are just a few of the many objectives that facility managers have to balance at once.

Making Cities Smarter

Making Cities Smarter

Safe cities attract businesses, foster innovation and provide countless opportunities. By working collaboratively, both public and private sectors can contribute to a solid foundation for the success of these great cities and their citizens.

Mitigating Workplace Violence

Mitigating Workplace Violence

To ensure continual patient care and remain compliant with regulations, hospitals have well-documented security protocols and deploy technology to ensure those can be executed smoothly, from cybersecurity solutions on the digital side to video surveillance and door scanners, among other tools, on premises.

tree of life synagogue

Homeland Security Committee Meets to Discuss Prevention of Violence Against Religious Organizations

In Jackson, Mississippi, the acting DHS secretary met with religious leaders and lawmakers to discuss ways that the department is acting to protect faith institutions targeted for violence.

medical devices

Healthcare Industry Facing Growing Range of Cyber Threats From Hackers, Foreign Countries

A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices.

Massachusetts Nurses Push For Law To Protect Them From Patient Violence

Massachusetts Nurses Push For Law To Protect Them From Patient Violence

The proposed measure would require hospitals and other employers to implement workplace violence prevention programs.

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

More companies are rethinking their active shooter training programs and evaluating the financial risk of shootings at their locations.

Protecting His House

Protecting His House

Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.