Identity management playing greater role in healthcare cybersecurity

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems


ID management has become crucial to fighting cybercrime as cloud computing and the internet change the nature of access and security, according to an article on the Healthcare IT News website.

Security professionals must focus on managing the identities of every user, said John Houston, vice president of information security and privacy at the University of Pittsburgh Medical Center.

“The concept of perimeter is changing due to the internet and cloud computing,” Houston said in the article. “Identity is the new perimeter.” 

The most important thing security professionals can do is maintain control over who has access to the hospital’s systems. A strong defense strategy begins there. 

Read the article.

 

 



May 31, 2017


Topic Area: Security


Recent Posts

Where Workforce Strategy Meets Facility Design

Designing healthcare facilities with the same rigor applied to clinical programming creates environments where clinicians want to stay.


OCAD Student Research Inspires Dementia Friendly Shower Redesign at UHN Hospital

The space responds to a common challenge in care environments, where showering can be disorienting and stressful due to unfamiliar surroundings, noise and limited privacy.


Atrium Health Navicent Ensnared in Oracle Health Data Breach

Currently, this incident did not involve access to credit card information or bank account information.


Two Steps to Controlling the Hot Zone

Strategy for disrupting dry-surface biofilm begins with a simple premise: You cannot disinfect what you cannot reach.


RiverSpring Living Breaks Ground on River's Edge Senior Living Community

Occupancy is expected in December 2028.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.