Security Management

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

Your Hospital’s Survival Depends on the Ability to Signal and Adjust

For the human body to develop properly and stay healthy, many processes must work together at many different levels – from organs to cells to genes. Cells are constantly receiving… Read more »

15 Comments

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

8 ways hospitals can benefit from an “intelligent infrastructure”

The United Nations predicts that the number of people who are 60 or older today – 841,000,000 – will increase to 2 billion by 2050. The sheer number of patients… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

Safety First: Leon County/Tallahassee Join Forces and Up Power Protection

Today we’ll feature guest blogger Carl Morgan, construction manager for Leon County, Florida. Carl details below his data center installation within the Tallahassee/Leon County Public Safety Complex. Not every business needs… Read more »

Leave a comment

3 Benefits of Using Safety Embedded Drives in Industrial Machines

Machine safety in the factories has evolved in recent years. Safety components and systems are no longer installed only to satisfy the minimum requirements and laws. Today the companies have… Read more »

4 Comments

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Matriculating Healthcare Team members into Healthcare Facilities Directors

Matriculating Healthcare Team members into Healthcare Facilities Directors. How do you fill that gap? There is no doubt the past 20 years has seen several orders of change when it… Read more »

2 Comments

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

Focus on Your Risk Strategy: Cyber Security for the Smart Grid

Today’s automated distribution grids are under pressure to significantly improve network and operational efficiency while still securing critical infrastructure reliability. The transformation of existing utility assets thanks to the convergence… Read more »

1 Comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Why Cybersecurity Matters in Food & Beverage?

May 2017, the world faced one of the most serious cyber-attacks. The Ransomware Wannacry put at risk 200,000 companies spread over 150 countries. Immediately after, every company, including those in… Read more »

2 Comments

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment