Applying the basics of network security

Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement


Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement, according to an article on the Campus Safety website.

Network services that may be left unsecure, or simply accessed by other vendors servicing their network-based devices, can be points of vulnerability.

Other points of failure may result when someone is accessing a remote junction box or conduit trough when trying to trace a cable or locate a splice point, the article said.

On the plus side, securing power supplies with a tamper switch and adding simple locking devices can help safeguard against accidental power loss.

Read the article.

 

 



February 1, 2017


Topic Area: Security


Recent Posts

How Backup Power Needs Vary Across Healthcare Settings

Manufacturers discuss how evolving codes, technologies and care settings shape healthcare backup power strategies.


Flexible Design Strategies Help OhioHealth Maximize Clinical Space

Doing more with less was key to the renovated facility’s design.


New Bass Center for Childhood Cancer and Blood Diseases Opens

The new space not only offers more exam rooms but also features 15 private infusion bays to allow privacy for all patients and their caregivers during treatment.


Encompass Health Rehabilitation Hospital of Daytona Beach Opens

Hospital amenities include all private patient rooms, a spacious therapy gym featuring advanced rehabilitation technologies, an activities of daily living suite and more.


What Healthcare Facilities Can Learn from a $49 Million Window Failure

A major window system failure at the University of Iowa’s Children’s Hospital sparked a costly replacement project – and a $49.4 million arbitration win.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.