Network Access Compliance in the Cards
- Maximum security. Taylor, Mark // Modern Healthcare;11/18/2002, Vol. 32 Issue 46, p36
Focuses on the role of high-technology systems in U.S. hospitals. Advantages of using hospital security systems; Kinds of high-technology equipment that are purchased by hospitals; Background on the reduction of crimes committed in hospitals; Disadvantages of such systems for privacy and...
- Proactive planning. Hodgson, Karyn // Security: Solutions for Enterprise Security Leaders;Jun98, Vol. 35 Issue 6, p22
Discusses the security systems implemented by Thomas Knox, director of safety, security and transportation services of Oak Park, Illinois-based West Suburban Hospital Medical Center. Implementation of black and white cameras; Need to take a proactive and preventive stance when looking at...
- Security's focus on healthcare industry. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jun98, Vol. 35 Issue 6, p24
Focuses on security system implementation of hospitals in the United States. Interest of security executives in CCTV surveillance and specialized technology such as infant monitoring; Prevalence of using security ID; Security requirements; Security integration; Lowest risk of security concerns...
- Puzzled by security? Moss, Brenda // Health Facilities Management;Jul2002, Vol. 15 Issue 7, p16
Discusses the role of hospital personnel in improving hospital security efforts. Information on the solicitation of hospital participation for security programs; Venues for introducing staff to hospital security efforts; Strategies to gain support for security programs.
- Keeping Italian City's Main Hospital Secure. // Security: Solutions for Enterprise Security Leaders;Apr2009, Vol. 46 Issue 4, p18
The article reports that Villa Sofia-CTO, the main hospital in Palermo, Italy, has been installed with more than 650 camera security video systems to provide the latest surveillance technology which would protect the staff, patients, visitors, and assets. The video system will be installed on...
- User identity: the key to safe authentication. Stuhlmuller, Rod // Communications News;Mar2000, Vol. 37 Issue 3, p32
Reports on the need for user identity authentication to keep data stored in computer networks secure. Security implications of electronic commerce; Weakness of traditional username/password network security measures; Details on the symmetric key infrastructure security solution.
- IDENTIFY SECURITY LEAKS. Courter, Eileen // Credit Union Management;Dec2000, Vol. 23 Issue 12, p22
Discusses the importance of an information system security audit. How Insuretrust conducts an audit; Factors to consider when assessing information system security; Steps a security audit should cover. INSETS: NOTHING IS PERFECT;ONLINE RESOURCES.
- Hackers (and business competitors) beware. Martin Jr., Walter P.; McHenry-Schmal, Linda L. // America's Network;8/1/94, Vol. 98 Issue 15, p50
Features the development of the Secured System Access Line (SSAL) network security system by Proctor and Associates. Protection against network intruders; Highly effective anti-hacking safeguards of the SSAL.
- ISS bolsters security analysis. Messmer, Ellen // Network World;3/25/2002, Vol. 19 Issue 12, p12
Focuses on the computer network security software of Internet Security Systems in the U.S. Collection of security date from multiple vendors; Assessment on the condition of the intrusion-detection system market; Acquisition of Network ICE.