Page 55 - Security Today, September 2018
P. 55
including quickly locating critical medical equipment, beds, crash carts and other medical devices by providing the missing link be- tween these assets and a trusted ecosystem.
Another emerging IoT trend in healthcare is the use of digi- tal certificates to secure hospital assets such as IP-based video surveillance cameras so they are not vulnerable to cyberattacks. Until now, these security cameras connected to the IoT were vul- nerable to hackers who could compromise them and gain access to an organization’s IT infrastructure. Now, they can be turned into trusted edge devices in the IoT through the use of digital certificates. Embedding certificates into these items provides a way to authenticate them and to encrypt the data traffic flowing between them.
The future of connected health may be even brighter in the home. The combination of NFC tags, mobile apps, cloud au- thentication services and web applications simplifies “proof of presence” by making it easier to document the time, location and accurate delivery of prescribed care. This is helping to drive grow- ing adoption of electronic visit verification (EVV), which helps streamline in-home patient visits, ensure security and patient pri- vacy, and eliminate billing fraud.
Reducing Risk
One of the most promising weapons in the fight against healthcare fraud, malware and data breaches is real-time risk profiling tech- nology that protects against both established and recent threats that target users both on-line and on mobile devices. Today’s risk man- agement solutions protect a wide variety of transaction systems and sensitive applications, providing a combination of evidence- based capabilities and behavioral biometrics supported by machine learning. They offer a highly promising way for hospitals to detect phishing, malware and fraudulent medical or financial transac- tions, and prevent medical account takeovers and session stealing.
There is a revolution underway in healthcare that is spurring active investment in the security infrastructure. Administrators are prioritizing their expenditures to fuel key initiatives including adopting a seamless trusted identity management experience that fights cybersecurity threats while streamlining compliance and ushering in exciting new connected health capabilities, from the hospital to the home.
Sheila Loy is the director of Healthcare & Insurance - Identity & Access Management, with HID Global.
Online Security Technology Training
Take charge of your security technology training with our online training courses. Train as an individual or implement a companywide program with a Corporate Account.
and
Our courses are suitable for everyone in the security industry. They are available 24/7, making it the most convenient and cost-effective solution for anyone who wants to improve security knowledge or skills. Approved for Continuing Education (CE) by various security associations and government bodies, the courses include:
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology
Register today at securitytodayacademy.com
Untitled-5 1
7/30/18 12:57 PM
Go to sp.hotims.com and enter 203 for product information.
WWW.SECURITYTODAY.COM NS7