Security by Industry Control for Healthcare and Nursing FacilitiesGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-04-19T04:00:00ZKim Loy<p>​Access control within the healthcare industry—particularly in hospitals and nursing homes—requires a unique approach, encompassing not only main entrance doors, but also internal entrances and exits based on location and access level. And more than that, these facilities must manage large quantities of data, making data management a critical component of a comprehensive security plan.  </p><p>Security managers can work to secure these components by seamlessly integrating systems together. For example, various doors and locks can be programmed to activate at specific times and rules can be applied based on time of day, shift changes, specific department access, and more. Healthcare facilities also look for the ability to control access remotely through mobile applications, confirm identity quickly and easily, and program varying levels of access for visitors, patients, doctors, and staff. These facilities also require oversight 24 hours a day, seven days a week, which can be a challenge for security directors. </p><p>Similarly, nursing homes require robust access control to protect patients and high-value assets, such as medical equipment and prescription medications, from internal and external theft. Additionally, some nursing home patients require more robust monitoring, meaning that access control points and video surveillance must work together to enable administrators to monitor incoming and outgoing patients, visitors, and staff. </p><p>Both kinds of facilities must be careful with sensitive materials, such as narcotics and sterile environments, that require added protection and protocols. Medical files and controlled substances must be protected by electronic access-controlled cabinet locks to provide hospitals and administrators with the required audit trail in case of a breach. </p><p>Video surveillance in nursing homes is a critical component of a comprehensive security solution. Its usefulness centers around operational efficiencies such as managing deliveries of important goods, monitoring food preparation, ensuring proper care of patients, and overseeing the constant flow of people coming in and out of a facility. Video also becomes important in the event of an incident for investigative purposes. </p><p><strong>Putting it All Together</strong></p><p>A large healthcare organization must take the safety and security of patients—and their personal information—seriously. Implementing a security management system (SMS) can integrate a facility's access control technologies, digital video, and alarm monitoring systems into a single, streamlined solution. </p><p>Going even further, in many large enterprise organizations, multiple databases can be incorporated into an SMS, including a human resources software program. The result is the ability to streamline data input with the push of a button. For example, when an employee is terminated, access is automatically revoked when an HR manager changes the person's employment from "active" to "inactive." This means the integration of data requires only a single update to control access across the campus. </p><p>The need for integration will continue to drive innovation in access control, not only for security systems, but also for human resources, directory software tools, and event management programs. Busy facilities and their administrators require the ability to grant permissions in a way that not only saves time and energy on manual input, but also makes changing permissions easy and efficient.  </p><p>Also important to a healthcare facility is the protection of personal information from prying eyes and hackers, which means access to records must be heavily protected. In many facilities, biometrics are being used—via iris or fingerprint scanners—to protect important information from would-be hackers. This way, only authorized users have access to the information. Additionally, IT departments within these facilities are working closely with security leaders to ensure that networks are as secure as possible to protect from ransomware attacks, which have plagued the healthcare industry in the last few years.  </p><p><strong>Locking Down </strong></p><p>Lockdown capabilities are paramount within today's healthcare settings, driving access control manufacturers to provide solutions that make it easy for security directors to control access quickly and efficiently in the event of an emergency. End users are also looking for mobility, and having a mobile application to help grant access, freeze access, or change permissions easily is important in this vertical market, along with the ability for security teams and professionals to move freely throughout the facility.  </p><p>One area where this is critical is in nursing homes. These entities must provide loved ones with the knowledge and peace of mind that their family members are safe while balancing freedom with security. In some instances, patients with dementia or Alzheimer's require additional, around-the-clock care that can be extended to the entrances and exits of a facility. In turn, nursing homes must invest in the ability to lock down a facility to keep patients from exiting without notifying staff, while also providing the welcoming environment that facilities hope to foster. Certain access control systems allow caregivers within a nursing home facility to let visitors in and out with the touch of a button, while keeping at-risk patients from exiting the facility.  </p><p>Healthcare facilities must provide safety and security for visitors, patients, staff, and assets. The ability to lock down portions of a hospital or an entire facility is crucial to its ongoing operations. Additionally, having a system in place that allows security officials to communicate these rules quickly and efficiently through an easy-to-use interface is key to adhering to the rules and regulations that govern healthcare facilities. Access control is critical to the success of security programs, and being able to integrate with data management platforms can make this task easier than ever before.  </p><p><em>Kim Loy is director of Technology and Communications at Vanderbilt Industries.</em></p> Recovery Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition. by Design in Abu Dhabi Over Fire 2018 Industry News TestÓN.aspx2018-03-14T04:00:00Z​ESTRATEGIAS DE CONTENCIÓN​ Integrity Through the Cracks Holidays from Security Management Entries Spotlight Innovation Online February 2016 2018 Industry News 2017 Industry News a Security Transition Trends License to Operate Facilities Tackle an Explosive Problem 2018 Industry News the Shots the Language of Payroll the Way IV Tests The North American Power Grid Water Risk;-SRO-Ends-Threat.aspx2018-03-20T04:00:00ZShooting at Maryland High School Leaves One Dead; SRO Ends Threat from the End: Creating a Master Security Plan Governor Unveils Major School Security Plan In Wake Of Shooting Fraudians Slip In Technology with a Personal Touch Identity Crisis Control for Healthcare and Nursing Facilities Review: Healthcare Emergency Incident Management Are People First to Learn from Las Vegas Review: Sports Travel Security,-Expert-Says.aspx2017-10-04T04:00:00ZBag Checks At Hotels Unlikely To Become New Normal, Expert Says 2017 Industry News in Shared Spaces Fine Art and Other Industry News Fight Against Fake Pharmaceuticals Smart Solutions Online Pharmacies Review: Practical Aviation Security, Third Edition Challenges Facing Aviation Security to Hurt 2018 Industry News Surveillance Most Resilient Countries in the World

 You May Also Like... Review: Supply Chain Security<p><em>​Butterworth-Heinemann;; 200 pages; $49.95.</em></p><p>Anyone who intends to enter the realm of supply chains and logistics must read <em>Global Supply Chain Security and Management. </em>Author Darren Prokop brings vast experience in the academic and practical worlds of supply chain management to this book. He goes the extra mile to package a tremendous amount of critical information in a compact volume to produce an easy-to-read narrative and valuable reference guide to these types of global operations.  </p><p>Not only does the book identify the threats of today and tomorrow, it also provides useful insight on how to combat them. Going beyond the issues of insider/outsider theft and shipping damage, Prokop redefines the threat to include terrorism and natural disasters. He adds key chapters on topics of human and natural threats, information technology, and risk mitigation. </p><p>Prokop introduces the concept of game theory in the synergies between players in the global shipping arena, and he explains how a competitive situation may morph into a cooperative one. He points out the dual role that government plays in the global shipping effort—serving as both a policing agent and a supply chain partner. Key take-aways include recent U.S. regulatory decisions, the latest technologies for securing infrastructures, and up-to-date theories and techniques of industrial organization and security.</p><p>This book is an excellent tool for faculty and students of security management and supply chain management. Security practitioners in other disciplines would do well to add it to their professional libraries, as well.</p><p><em>Reviewer: Terry Lee Wettig, CPP, is an independent security consultant who served 10 years as director of risk management with Brink's Incorporated. A retired U.S. Air Force chief master sergeant, he is currently a doctoral candidate specializing in organizational psychology. He is an ASIS member. ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 2017 Industry News<h4>​VIKINGS STADIUM OPENS DOORS</h4><p>The new U.S. Bank Stadium—home of the Minnesota Vikings—hosted more than 66,000 fans at the first Monday night game of the 2017 season. Completed last year, the 1.5 million-square-foot stadium campus is flexible enough to serve as a true multipurpose stadium that can host football, soccer, baseball, basketball, motorsports, major concerts, and other events.</p><p>ASSA ABLOY was tapped to provide more than 1,500 doors and openings for the state-of-the-art stadium. A truncated construction timeframe provided the impetus for using preassembled openings. The ready-to-install openings improved onsite management of multiple components and saved time through a streamlined installation process.</p><p>The openings included products from ASSA ABLOY Architectural Door Accessories, including McKinney hinges, Pemko accessories, and Rockwood door trim, as well as Curries hollow metal doors and frames; Sargent locks, exit devices, and door closers; Medeco high-security cylinders and keys; and Securitron access control components.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Dahua Technology is partnering with Anixter International to market Dahua products throughout the United States and Canada.</p><p>Anomali and NSS Labs, Inc., announced a strategic partnership that provides enterprise customers with a unified view of unmitigated threats and empirical data regarding the effectiveness of security controls.</p><p>Bold Technologies completed the integration of ManitouNEO with innoVi from Agent Video Intelligence to provide monitoring centers with a video intrusion system. </p><p>Boon Edam product data and customized specifications for the Americas are available through the ARCOM software platform to architects, engineers, and design professionals.</p><p>Brady announced that its Brand Protection business partnered with Kezzler and Honeywell to bring product authentication labeling and tracking to Genetron 134, a refrigerant. </p><p>ByteGrid Holdings LLC announced an agreement with Empowerment through Technology and Education to provide greater compliance and control of hosted business-critical data.</p><p>Baltimore Cyber Range LLC and Cyberbit Ltd. announced the opening of the new Baltimore Cyber Range cybersecurity training and simulation center in Baltimore, Maryland.</p><p>Camden Door Controls retained manufacturer’s representative JClemente & Associates to service its southern California territory.</p><p>Cellebrite is joining the National Center for Missing & Exploited Children and Project VIC in the global fight against child exploitation. </p><p>Claroty and Schneider Electric are partnering to address safety and cybersecurity challenges for the industrial infrastructure sector.</p><p>Conformance Technologies announced that Pivotal Payments selected its solutions to enhance business effectiveness and protection of its North American merchant portfolio. </p><p>The addition of deverus, Inc., background checking software to the iCIMS partner ecosystem will provide cost savings and improved speed to customers.</p><p>EventTracker announced that its SIEM platform was implemented at OneBlood, Inc.</p><p>Exabeam and ThreatConnect, Inc., announced a product integration designed to improve overall cybersecurity and incident response.</p><p>EyeLock LLC entered into a partnership with CSD (Central Security Distribution) to deliver EyeLock’s product suite in Australia. EyeLock is also developing iris authentication solutions to work with Qualcomm Mobile Security. </p><p>Farpointe Data helped Secure Our City, Inc., improve security access for a parking garage.</p><p>Galaxy Control Systems completed an integration with IP-enabled solutions from ASSA ABLOY. </p><p>Genetec and Alutel Mobility partnered to offer extended access control capabilities to open areas without having to rely on physical readers or installations.</p><p>Hikvision Canada Inc., provided cameras for the JPPS Children’s Centre in Montreal that were installed by integrator Alarme Sentinelle. Petite Echelle Centre in Montreal worked with integrator Intelgest to upgrade its security system with Hikvision.</p><p>Honeywell and eDist Security expanded their relationship around the Genesis Series Cable product line. </p><p>Huttig Building Products selected TierPoint to provide colocation and data center migration services.</p><p>Imagination Technologies and Sierraware are collaborating to make Sierraware’s SierraTEE available for devices based on Imagination’s MIPS CPUs.</p><p>ISONAS Inc. announced that Transportation Impact selected the ISONAS Pure IP access control solution to secure its corporate headquarters.</p><p>Johnson Controls announced that its American Dynamics victor Video Management Software integrates with the Guardian Indoor Active Shooter Detection System from Shooter Detection Systems.</p><p>Karamba Security joined the Automotive Grade Linux (AGL) Project and The Linux Foundation to help develop its cybersecurity best practices.</p><p>The Legrand On-Q Digital Audio System has been integrated with</p><p>Netwrix Corporation announced that its Netwrix Auditor empowers Guadalupe Valley Electric Cooperative to minimize insider threats and improve database security.</p><p>OnSSI and Seagate teamed up to provide a robust recording solution designed for more efficient system expansion and scalability.</p><p>Ever and Pinn formed a technology partnership to integrate Ever’s facial recognition into Pinn’s secure attribution platform.</p><p>Enterprise Performance Consulting joined the PSA Business Solutions Program to offer business consulting and operations team training programs to PSA integrators. </p><p>Point Blank Enterprises and Special Ops Bunker made an exclusive global marketing agreement to offer Special Ops Bunker products through the Point Blank global network.</p><p>Golden Lion Marbella, a casino in Panama, selected Qognify VisionHub to upgrade its security, safety, and operations.</p><p>RapidSOS is partnering with WiseWear, Fusar, Kairos, Lumenus, and ROAR for Good to provide a rich data link to 911 from wearable products, so users can connect to 911 by pushing a panic button or by detection from a wearable device during a crash or medical emergency.</p><p>Sky and Cisco have a multi-year digital security agreement to support the expansion of Sky video services across any screen.</p><p>Suprema announced that its BioSign mobile fingerprint authentication algorithm was selected by Samsung for two smartphone models.</p><p>Traka UK joined forces with Edesix, to ensure that equipment used across the U.K. Prison Service is safely stored and managed.</p><p>TruTag Technologies’ signature authentication solution will be used by Hongyang Biotechnology Co. to protect the livestock supply chain from counterfeiting and diversion.</p><p>Visual Management Systems Ltd. was invited to join the Airports Centre of Excellence, which aims to improve the passenger experience.</p><p>Vodafone Group joined the prpl Foundation to focus on enabling the security and interoperability of embedded devices.</p><p>VTT Technical Research Centre of Finland Ltd. and ITS Russia signed a partnership agreement concerning the development of intelligent transport systems for border crossings. </p><p>Watermark Risk Management International, LLC, and TEAM Software, Inc., created a strategic partnership where Watermark will be a preferred provider of consulting services on TEAM software solutions.</p><p>WestJet Airlines realized improved efficiency and streamlined communication by partnering with Send Word Now.​</p><h4>GOVERNMENT CONTRACTS</h4><p>AirMap and the Kansas Department of Transportation will deploy Unmanned Traffic Management technology across Kansas to support the growth of the state’s drone economy and ensure safer skies.</p><p>ATS Armor LLC received an order from Miami-Dade Police Department for 1,500 active shooter kits, enough for every patrol car.</p><p>Canon U.S.A., Inc., received two BLI PaceSetter Awards in the Document Imaging Security and Mobile Print categories from Keypoint Intelligence.</p><p>Cardiac Science announced that Boston Public Schools will purchase Powerheart G5 automated external defibrillators.</p><p>The State of Louisiana is working with CA Technologies to enable citizens to securely access information across government services through the Louisiana Enterprise Architecture Project.</p><p>An Elbit Systems of America Integrated Fixed Tower border security system passed U.S. Customs and Border Protection systems acceptance testing.</p><p>The city of Troy, Alabama, selected Extreme Networks software-driven networking technology to provide reliable, fast, and secure connectivity across 70 locations.</p><p>FirstNet and AT&T will deliver a specialized wireless broadband network to Arizona’s public safety community.</p><p>Sherburne County Sheriff’s Office in Minnesota will use GUARDIAN RFID technology to mitigate risk and improve operational efficiency in the Sherburne County Jail. </p><p>IPVideo Corporation was selected by the San Jose Police Department to help improve and upgrade its interview recording platform. </p><p>Janus Global Operations will clear areas of Mosul, Iraq, of ISIS-placed booby traps and other explosives under an agreement with the U.S. Department of State’s Office of Weapons Removal and Abatement.</p><p>Milestone Systems completed a security surveillance solution for Goyang City in South Korea.</p><p>NEC Corporation provided a facial recognition system for South Wales Police in the United Kingdom through NEC Europe Ltd.</p><p>Scott Safety was selected to provide technology and equipment to the California Department of Forestry and Fire Protection.</p><p>Southern Linc entered into a partnership with the City of Huntsville and Madison County Alabama’s 911 dispatch center to add LTE wireless data transmission equipment to connect first responders to the new network. </p><p>Agencies, including the U.S. General Services Administration, the U.S. Joint Chiefs of Staff, and the U.S. Army, have used eSignLive from VASCO Data Security for secure and compliant electronic signing of documents using Personal Identity Verification cards or Common Access Cards.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Atomic Data attained SOC 3 certification for the seventh year in a row from the American Institute of Certified Public Accountants.</p><p>Conduent Incorporated was awarded a U.S. patent for technology that automatically recognizes facial expressions using images from low-resolution cameras.</p><p>Consolidated Communications Holdings, Inc., achieved MEF CE 2.0 certification for carrier grade, interoperable Ethernet services. </p><p>Day & Zimmermann earned a ranking of 188 on the Forbes America’s Largest Private Companies list. It is also on the Defense News Top 100 List.</p><p>Everest Technologies received ISO 27001:2013 accreditation for its information security management system.</p><p>Fornetix, LLC, gained a U.S. patent that covers breakthrough solutions for the management of encryption keys and other security objects.</p><p>Hesco was placed in the Commander’s Choice category and recognized as a Superior Supplier to the U.S. Defense Logistics Agency.</p><p>Frost & Sullivan recognized IriTech, Inc., with the 2017 North American Frost & Sullivan Award for New Product Innovation.</p><p>StoneLock is the winner of the annual Government Security News Airport, Seaport, Border Security Awards Program for Best Facial Recognition Technology.</p><p>TEAM Software, Inc., is the winner of the 2017 Small Business of the Tournament Award for Nebraska.</p><p>Vinson Guard Service, Inc., gained national certification as a Women’s Business Enterprise by WBEC South, a regional certifying partner of the Women’s Business Enterprise National Council. </p><p>Zentera Systems, Inc., was awarded Best of Show for Best Security or Privacy Solution at IoT Evolution Expo.​</p><h4>ANNOUNCEMENTS</h4><p>AngelTrax relocated all operations into a renovated facility that serves as its new headquarters and manufacturing, inventory, and distribution centers.</p><p>ASSA ABLOY acquired SMI (Shree Mahavir Metalcraft), a leading OEM manufacturer of architectural hardware in India.</p><p>The Association of Public-Safety Communications Officials (APCO) International and IBM announced that APCO International’s new guide card software will use IBM Watson Speech-to-Text and Watson Analytics.</p><p>CEDIA and The Electronic Security Association announced a strategic reciprocal training relationship that will expand the educational opportunities for members of both associations.</p><p>Columbus State University received a grant from the U.S. National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. </p><p>EventTracker introduced the EventTracker Partner Program. </p><p>EY opened its advanced cybersecurity center in Dallas, Texas, to help clients stay ahead of emerging threats.</p><p>Lantronix, Inc., joined the Kepware IoT Alliance Program.</p><p>Marks USA, a division of NAPCO, launched a new website at</p><p>NXP Semiconductors N.V. is expanding its operations in the United States, enabling its U.S. facilities to manufacture security chips for government applications.</p><p>ONVIF announced the final release of Profile A for broader access control configuration and the Release Candidate for Profile T, a draft specification with advanced streaming capabilities that adds in support for H.265 video compression.</p><p>Proficio expanded into Hong Kong to broaden its presence in the Asia-Pacific region.</p><p>PSA is working with Matterhorn Consulting to enable PSA members to hire military veterans.</p><p>Stanley Black & Decker opened a new Breakthrough Innovation center in Boston dedicated to advancing technological innovation in its security business.</p><p>The Protection Bureau awarded scholarships to 10 children of company employees.</p><p>ThetaRay opened its first U.K. office in London.</p><p>Top Notch Distributors updated its website at</p><p>Toshiba Surveillance & IP Video Products Group launched its Safe Scholar program to help schools reduce the total cost of video surveillance system ownership. </p><p>WatchGuard Technologies acquired Datablink, a provider of advanced authentication solutions. </p><p>Webroot acquired the assets of Securecast, a security awareness training platform, and launched Webroot Security Awareness Training as a beta program.</p><p> ​</p>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465