Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

Seeking Standards for Microbial Loads in Healthcare Facilities

Why is there no binding standard for the acceptable microbial load on surfaces or in the air in hospitals?


UCR Health Unveils Plans for Major Expansion

The vision for the site will include an outpatient diagnostic center and possible future expansion.


High-Performance Windows Support Safety at UW Medicine's New Behavioral Health Center

Case study: Engineered for strength, quiet and daylight, the chosen windows help create a safe, calming and energy-efficient environment for patients and providers.


Central Maine Healthcare Dealing with IT System Outage

The organization identified unusual activity within their computer software, prompting them to secure and shut off all IT systems.


Kaiser Permanente Opens Newly Expanded Everett Medical Center

The facility offers primary care and pediatric care and has specialty care departments.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.