Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

The Fatal Flaws in Active Shooter Response in Healthcare Facilities

The most effective solutions to workplace violence are sophisticated emergency response planning and master level training for all employees.


Utah Hospital Outage Highlights Backup Power and Resiliency Challenges

The hospital went without power for nearly two hours.


Ground Broken on New North Dakota State Hospital

The 300,000-square-foot facility in Jamestown will provide 140 beds in a modern, trauma-informed care environment.


Form Your Pit Crew: Key Takeaways From the 2025 Healthcare Innovations Conference

The Healthcare Innovations Conference brought together healthcare facility managers from across the country to collaborate on industry issues.


Glens Falls Hospital Caught Up in Oracle Health Data Breach

As of November 2, 2024, Glens Falls Hospital no longer uses Oracle Health/Cerner as its electronic health record vendor.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.