Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

Healthcare Real Estate: Responding to Shifting Patient Demands

To compete in a changing landscape, healthcare organizations must turn their real estate from a cost center into a competitive advantage.


Over 40% of Workers Impacted by Seasonal Depression

Seasonal changes can have an impact on work performance.


Archer Property Partners Acquires Medical Office Building Near Tri-City Hospital

Archer plans a $2.5 million capital improvement program to fully modernize and reposition the asset as one of North County’s premier medical office destinations.


The OR HVAC Puzzle: Why Individual Systems Are on the Rise

Extra penetrations, tight clearances and strict humidity needs—design experts explain what it really takes to plan dedicated units for each operating room.


Sutter Health Announces Plans for New Santa Clara Medical Center

Sutter projects the medical center will open in late 2031.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.