Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

The Future of the Global Hospital Hygiene Market

A market study details the current state of the global hygiene market and the factors that are expected to make a big difference in the next decade.


Rethinking Fire Safety Inspections

Digital tools bridge the gap between growing facility complexity and workforce limitations, allowing teams to maintain the highest safety standards.


The Ohio State University Wexner Medical Center Officially Opens

With the new hospital comes other changes, including new street and building names on the medical campus.


Healthcare and Resilience: A Pledge for Change

Climate resilience and reducing environmental impact drive voluntary program targeting hospitals.


Texas Health Resources Announces New Hospital for North McKinney

Expected to open in 2028, the hospital will feature 60 beds initially with plans to double in capacity to accommodate for future community growth.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.