Applying the basics of network security

Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement


Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement, according to an article on the Campus Safety website.

Network services that may be left unsecure, or simply accessed by other vendors servicing their network-based devices, can be points of vulnerability.

Other points of failure may result when someone is accessing a remote junction box or conduit trough when trying to trace a cable or locate a splice point, the article said.

On the plus side, securing power supplies with a tamper switch and adding simple locking devices can help safeguard against accidental power loss.

Read the article.

 

 



February 1, 2017


Topic Area: Security


Recent Posts

Healthcare Facilities are Shifting Toward More Holistic Designs

As healthcare moves toward prevention and long-term wellness, the Alice L. Walton Healthcare Campus illustrates how design strategies are evolving to support this transition. 


Froedtert Hospital Unveils Six-Level Parking Structure

The new garage, which boasts a glass-enclosed design and modern parking management technology, elevates the parking experience.


Nemours Children's Breaks Ground on New Multi-Specialty Care Facility in Melbourne

With construction set to officially begin this summer, Nemours Children’s Health, Viera is expected to open in the summer of 2027.


Designing for Caregiver-Centered Support Spaces

When healthcare environments are designed to meet the needs of caregivers and patients, everyone who relies on the system experiences better outcomes.


Novant Health Gets Approval for Wesley Chapel Medical Center

The 32-bed hospital will be located in Monroe and is expected to be completed in 2030.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.