Healthcare security systems more than five years old may be vulnerable

Conducting an independent assessment can help ensure the most cost-effective equipment combined under a single platform


Many healthcare facilities need security systems upgrades, according to an article on the Medical Construction & Design website.

If the security system is more than five years old, criminals will already know how to breach it. Systems need to be upgraded every 3-5 years to be effective, the article said.

Conducting an independent assessment can help ensure the most cost-effective equipment combined under a single platform.

However, many hospitals delay implementation of surveillance systems because it is expensive to put infrastructure on the perimeter. 

Read the article.

 



July 19, 2016


Topic Area: Security


Recent Posts

How Curated Art Elevates Senior Care Spaces

Thoughtfully selected artwork can shape perception, improve flow and create a more engaging care environment.


The CDC's Guide to Hand Hygiene in Healthcare

Hand hygiene may seem simple, but the CDC has a set of guidelines that all healthcare facility managers and staff should be aware of. These are just a few of the notable tips. 


Dana-Farber, BIDMC Launch Construction of Dedicated Adult Cancer Hospital

Deconstruction begins on former Joslin site as 300-bed, oncology-focused facility moves toward a planned 2031 opening.


5 Components of an Integrated Safety Culture in Healthcare

The goal is not to create a fortress but to build a space where patients feel protected and caregivers feel empowered to deliver exceptional care.


NYC Opens Therapeutic Housing Unit for Medically Vulnerable Detainees

The NYC Health + Hospitals system has launched a 104-bed Outposted Therapeutic Housing Unit at Bellevue Hospital, offering specialized care for detainees with serious medical conditions.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.