IAHSS publication

Body Worn Camera Use in Health Care Facilities

Dana Frentz, CHPA, PSPCompliance, News, Security Program Development

>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …

empty classroom

Reflections on Oregon Shooting

Christine L. Peterson, CPP, ISPSecurity Program Development, Workplace Violence

The shooting at Umpqua Community College on October 1, 2015, made us think. Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting to commit harm. What we can do is harden ourselves as targets. This will …

data center

Physical Security for Data Centers

Emily SchackSecurity Assessment, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Testing and Commissioning

It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …

Policy and Procedure Flow Chart

A Company Model for Developing Policies and Procedures

Christine L. Peterson, CPP, ISPCompliance, Security Program Development

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …

locked computer

Data Security: Where There Is Data, There Should Be Policy

Russell W. Gilmore, CISSP, CISM, EnCECompliance, Computer Forensics, Crisis Management Planning, Electronic Data Recovery, Security Program Development

The recent report by the Wall Street Journal about the Morgan Stanley data security breach scares me as an employee. Reportedly, Morgan Stanley terminated Galen Marsh, a financial adviser, for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. Federal law enforcement officials are focusing their probe on the possibility that Marsh’s computer …

sick person

Avoiding Pandemic Paranoia

Billy Gordon Green, Jr. M.Ed., CPP, CHSCompliance, Crisis Management Planning, Security Program Development, Training

Twice during the past decade and a half, the specter of pandemic has been a cause for prudent worry in the public health sector, among business continuity planners, and certainly within the security community. Security professionals would not be tasked with reducing the impact upon the public or generally with providing for the continuity of operation for a large corporation, …

global integration

Managing Global Integration of Systems

Amanda StricklandSecurity Master Planning, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Lifespan Management

During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …

The Difference Between Safety and Security

Christine L. Peterson, CPP, ISPSecurity Master Planning, Security Program Development

Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need for safety is the second most critical stage to our wellbeing. Whether or not we believe in Maslow’s theory, we can all agree that on its surface …

hospital

Behind the Scenes of the Recent IHSSF Crime Survey

Dana Frentz, CHPA, PSPSecurity Assessment, Security Program Development

In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number of participants or size of the facility. The goal of the Crime Survey was to create measurable and trending data based on three different denominators – bed count, …

time

The “Fractional” Security Manager

Amanda StricklandSecurity Assessment, Security Master Planning, Security Program Development

The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a security issues they faced such as internal theft, threat to executives, employee malfeasance, compliance issues, or other security problems. These issues turned into the need for an …