>As a result of the “Evidence Based Healthcare Security Research” Series, the IAHSS Foundation published Body Worn Camera Use in Health Care Facilities. The Foundation’s research series summarizes the current state of knowledge regarding specific challenges in healthcare security. You can downloaded the report here. The International Association for Healthcare Security and Safety – Foundation (IAHSS Foundation) began in 1981. …
Reflections on Oregon Shooting
The shooting at Umpqua Community College on October 1, 2015, made us think. Security events are deliberate actions by people to cause harm. There is no way that any organization can keep people who are adequately motivated and have access to the right resources from attempting to commit harm. What we can do is harden ourselves as targets. This will …
Physical Security for Data Centers
It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …
A Company Model for Developing Policies and Procedures
While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. Mark shared with the …
Data Security: Where There Is Data, There Should Be Policy
The recent report by the Wall Street Journal about the Morgan Stanley data security breach scares me as an employee. Reportedly, Morgan Stanley terminated Galen Marsh, a financial adviser, for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. Federal law enforcement officials are focusing their probe on the possibility that Marsh’s computer …
Avoiding Pandemic Paranoia
Twice during the past decade and a half, the specter of pandemic has been a cause for prudent worry in the public health sector, among business continuity planners, and certainly within the security community. Security professionals would not be tasked with reducing the impact upon the public or generally with providing for the continuity of operation for a large corporation, …
Managing Global Integration of Systems
During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …
The Difference Between Safety and Security
Maslow’s Hierarchy of needs begins with humanity’s most basic needs and builds from there until we reach our most satisfied self. After our most basic physical needs (air, food, water, sleep), the need for safety is the second most critical stage to our wellbeing. Whether or not we believe in Maslow’s theory, we can all agree that on its surface …
Behind the Scenes of the Recent IHSSF Crime Survey
In summer 2013, the International Healthcare Security and Safety Foundation (IHSSF) tasked a small group of members to develop a hospital Crime Survey based on a common metric regardless of the number of participants or size of the facility. The goal of the Crime Survey was to create measurable and trending data based on three different denominators – bed count, …
The “Fractional” Security Manager
The “Fractional” Security Manager: A Cost Effective Approach to Managing Security I have met with a large number of business leaders – especially in small business – over the years because of a security issues they faced such as internal theft, threat to executives, employee malfeasance, compliance issues, or other security problems. These issues turned into the need for an …









