Security Technology Executive

MAY-JUN 2016

Issue link: https://securitytechnologyexecutive.epubxp.com/i/690996

Contents of this Issue

Navigation

Page 23 of 91

24 SECURITY TECHNOLOGY EXECUTIVE • May/June 2016 www.SecurityInfoWatch.com SECURING HEALTHCARE by M ar k Lo ga n a n d D r. K ir s t en H oy t , T h e U ni ver si t y of Ph o eni x W e all recognize the vital role healthcare facilities play in providing care for the sick and the injured. W hen there is a crisis, those who have suffered the greatest harm are rushed to a hospital or medical center for treatment. But what hap- pens when there is a crisis at the healthcare facility itself? What happens when the danger isn't medical in nature? How are patients and staff protected? Planning for crises is vital for any organization, but even more important in an industry the pub- lic depends on when there is an emergency. This is why many healthcare facilities have developed contingency plans in the event of a natural disas- ter or mass trauma[i]. However, the 9/11 attacks, and the anthrax attacks which took place a few weeks later, uncovered weaknesses in the U.S. national public health infrastructure[ii] when it comes to providing security. These include a lack of clear communication, poor training, and inad- equate equipment. We believe there are two types of incidents that should be the biggest focus for security in the healthcare system. The Active Shooter Situation Active shooter incidents have been on the rise in the U.S. Between 2007 and 2013, there was an average of more than 16 incidents per year, a dramatic increase from the seven years prior, which had an average of just over six incidents per year[iii]. Confronting Healthcare Security in the 21st Century Prescription for Success: * Have a proactive plan * Practice that plan * Make sure staff is on board * Collaborate & communicate * Partner with public safety 2 4 S E C U R I T Y T E C H N O L O G Y E X E C U T I V E • M a y / J u n e 2 0 1 6 w w w . S e c u r i t y I n f o W a t c h . c o m c o n t i n g e n c y p l a n s i n t h e e v e n t o f a n a t u r a l d i s a s - t e r o r m a s s t r a u m a [ i ] . H o w e v e r , t h e 9 / 1 1 a t t a c k s , w h i c h h a d a n a v e r a g e o f j u s t o v e r s i x i n c i d e n t s p e r y e a r [ i i i ] . P r e s c r i p t i o n f o r S u c c e s s : * H a v e a p r o a c t i v e p l a n * P r a c t i c e t h a t p l a n * M a k e s u r e s t a f f i s o n b o a r d * C o l l a b o r a t e & c o m m u n i c a t e * P a r t n e r w i t h p u b l i c s a f e t y Proactive strategies are needed to address both physical and network security threats

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2016