Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

Turning Facility Data Into ROI: Where Healthcare Leaders Should Start

Better data, smarter tools and small facility upgrades can drive measurable returns, guide ambulatory strategy and improve patient experience.


Sutter Health Breaks Ground on Advanced Cancer Center and Care Complex

The new center, located on Sutter’s Memorial Medical Center campus, will feature four stories and 165,000 square feet of modernized, patient-centered space.


Imperial Beach Community Clinic Caught Up in Email Cyberattack

The unusual activity they detected occurred between February 4, 2025, to May 2, 2025.


Social Media Driving Rise in Trade Jobs

Social media is the second largest career influencer for Gen Zers.


North Carolina Children's Receives $25M Gift from Coca-Cola Consolidated

The gift is the first step towards the goal of raising more than $1 billion for the new NC Children’s campus in Apex.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.