Applying the basics of network security

Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement


Many strategies that can protect a healthcare facility's electronic security from cyberattacks are simple to implement, according to an article on the Campus Safety website.

Network services that may be left unsecure, or simply accessed by other vendors servicing their network-based devices, can be points of vulnerability.

Other points of failure may result when someone is accessing a remote junction box or conduit trough when trying to trace a cable or locate a splice point, the article said.

On the plus side, securing power supplies with a tamper switch and adding simple locking devices can help safeguard against accidental power loss.

Read the article.

 

 



February 1, 2017


Topic Area: Security


Recent Posts

Severe Winter Weather: What Healthcare Facilities Must Prioritize

Prioritizing critical systems and strategies is key to protecting patients, staff and operations during severe winter weather.


Recovery Centers of America Opens New Facility in Florida

Spanning 19 acres, the campus will include seven buildings, a pond, an outdoor recreation area with a pool, a full basketball court and a rock-climbing wall.


Munson Healthcare Caught Up in Third-Party Data Breach

The vendor has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information.


From Downtime to Data: Rethinking Restroom Reliability in Healthcare

Manufacturers discuss the operational issues plaguing healthcare restrooms and how to shift maintenance from reactive to resilient.


LeChase Building Four-Story Addition to UHS Delaware Valley Hospital

It will consolidate services into a state-of-the-art Medical Neighborhood.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.