Hospital Shooting: Florida Facilities Beef up Security With Armed Guards, Random Bag Checks

From “Hospital Shooting: Florida Facilities Beef up Security With Armed Guards, Random Bag Checks”
Fierce Healthcare (07/25/2016) Minemyer, Paige. Reposted by ASIS

Central Florida hospitals are bolstering their security in the wake of a deadly shooting at an area facility. The shooting at Parrish Medical Center earlier this month has sparked security concerns in the area. Parrish itself has reportedly increased security in its emergency department and main entrance, instituting random bag checks, and restricting access at certain locations within the facility. Health First, a system that owns four other hospitals in the same county, is also implementing those measures, as well as employing armed guards, which has some worried patient safety will be endangered. Orlando Health, the hospital that treated the majority of patients injured in the Pulse nightclub shooting, is now screening people entering its hospitals with wand and bag checks. Hospitals across the country are increasingly planning for active shooter situations in their facilities, or to handle a sudden overflow of patients should a shooting occur elsewhere.


Is Your Hospital’s Communications System Ready for the Next Big Emergency?

From “Is Your Hospital’s Communications System Ready for the Next Big Emergency?”
Campus Safety Magazine (06/08/2016) Winn, Zach. Reposted by ASIS.

Updated emergency communications systems designed to meet hospitals’ unique needs are crucial to maintain real-time communication during emergency situations. Emergency communication between different organizations or responding teams can pose challenges if communication channels are encrypted; hospitals are required to make their communication channels compatible with local law enforcement and emergency response services. Companies like Mutualink provide interoperable networks by inserting existing communications infrastructure into an IP network. “It allows emergency commanders to, among other things, create incident channels,” said Mutualink’s Rob Wright. “So if there are multiple teams responding to something, they can be added to the channel in an instant and communicate seamlessly.” Experts stress redundancy in emergency notifications; alerts should be sent through a number of platforms, including text messages, phone calls, emails, overhead paging, and desktop alerts. Cutting lag time in emergency notification and response is a priority, according to Bryan Warren, director of corporate security for the Carolinas Healthcare System. “By their very nature, emergency situations are very fluid and dynamic,” said Warren. “Without real time, up-to-the-second details and effective two-way communication capabilities, poor decisions can be made.”

Wondering if that LinkedIn password e-mail is real? Read on.

Security Management Magazine by 

LinkedIn is invalidating passwords for all accounts created before 2012 following the disclosure that 100 million members’ passwords may have been compromised.

In a post on the social network’s blog, LinkedIn confirmed that in 2012 it was the victim of an unauthorized access and disclosure of 6.5 million of its users’ passwords.

“At the time, our immediate response included a mandatory password reset for all accounts we believed were compromised as a result of the unauthorized disclosure,” the blog post said. “Additionally, we advised all members of LinkedIn to change their passwords as a matter of best practice.”

On Tuesday, however, LinkedIn became aware that an additional set of data that has been released claims to be e-mail and hashed password combinations of more than 100 million LinkedIn members from the 2012 theft.

The data is reportedly for sale on a dark web market called The Real Deal by the dealer Peace, who is selling the data for 5 Bitcoin (approximately $2,200), according to Forbes.

Due to this new development, LinkedIn began invalidating passwords on Wednesday for all accounts created before the 2012 breach that have not updated their password.

“We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will continue those members to reset their passwords,” the blog post explained. “We have no indication that this is as a result of a new security breach.”

LinkedIn said it will be notifying individual users if they need to reset their password. “However, regularly changing your password is always a good idea and you don’t have to wait for the notification,” it explained.

To change your password on LinkedIn, follow the below instructions:

  1.  Login to your LinkedIn account
  2. Move your cursor over your photo in the top right of your homepage and select Privacy & Settings
  3. Select the Account tab at the top of the page
  4. Under the Basics section, click Change next to Change Password
  5. Enter your old password, type your new password, and then type it again to confirm it. (Passwords are case sensitive and must contain at least six characters.)
  6. Select the checkbox if you’d like to automatically be signed out of all sessions once you change your password
  7. Click Save

Report: Security and Privacy Fears Can Affect Internet Use

From “Report: Security and Privacy Fears Can Affect Internet Use”
PC Magazine (05/14/16) Murphy, David. Posted by ASIS.

About one-fifth of 41,000 respondents said they were victims of some sort of negative personal experience online in the last year, according to a new report from the Nationals Telecommunications and Information Administration. The report’s conclusion noted that it appears many Americans have completely changed their online behavior in the wake of privacy concerns. In fact, 45 percent of respondents indicated their concerns stopped them from conducting online financial transactions, buying goods and services, posting on social networks, or expressing opinions. Around 30 percent refrained from at least two of those activities. Most respondents cited identity theft as their main concern, followed by credit card and banking fraud, data collection by online services, loss of control over personal data, and the government collecting user data. The most concerned users were those who had experienced a breach of data in the past. NTIA will conduct additional studies to learn more about the public’s Internet practices related to online security and privacy.

Don’t Be A Victim- Avoid Smash and Grabs

The weather is nice and the bad guys are back in town.  That means crime season is upon us and the season is usually welcomed with car break-ins.  Car break-ins are easy, generally productive, and lower risk than other larcenies.  Please take a minute to review the attached flyer for some ideas to keep your stuff off of some naughty person’s list.

2015 vehicle smash and grab flyer.jpg

Health Care Employees Bear Brunt of Workplace Assaults, Research Finds

From “Health Care Employees Bear Brunt of Workplace Assaults, Research Finds”
ABC News (04/27/16) Winter, Gretchen. Published by ASIS.

A new article in the New England Journal of Medicine has revealed just how often health care workers face both verbal and physical violence in the workplace. The most common form of workplace violence in the health care setting is perpetrated by patients or visitors against health care providers, accounting for 75 percent of aggravated assaults, and 93 percent of all assaults against employees in hospitals, according to the findings. Lead author James Phillips, an attending physician at Beth Israel Deaconess Medical Center and Instructor at Harvard Medical School, reviewed prior studies of attacks and found that health care workers are almost four times as likely to miss work because of violence than from other injuries. One study revealed that 4.5 percent of violent health care incidents occur against emergency medical services providers. Ninety percent of the time, patients were the attackers in these incidents. The highest rates of abuse in hospitals are against nurses and nursing aides. One study found that 39 percent of nurses involved reported verbal assaults annually, while 13 percent reported physical abuse. About one in four emergency medicine doctors reported being physically assaulted in the prior year, and nearly four out of five reported some kind of workplace violence. One in 10 physicians experienced workplace violence each year between 1993 and 2001. Studies found that psychiatrists are at a particularly high risk, with 40 percent reporting physical attacks. Phillips’ article states that violence against health care workers goes grossly underreported. One survey used in the review found episodes of violence were only reported by 30 percent of nurses and 26 percent of doctors.