May-June 2016

Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Panoramic & 360-Degree Surveillance Cameras

Tech Trends: Upping the Ante in Panoramic

June 13, 2016
Manufacturers have intensified R&D, creating exciting choices for integrators and end-users
Photo Courtesy of Principal
Sandy Cowie, Director of Global Security at Principal (left), shares a moment with senior members of her security staff, Jim Ellis, Assistant Director of Site Security (center) and Pete Lowell, Assistant Director of Personnel Security (right).
Video Surveillance

An Investment in Risk Management

June 7, 2016
An enterprise risk roadmap is essential to corporate security at Principal
Laskynew 10517901
Information Security

Editor's View: Healthcare Data Pirates

June 7, 2016
The advancement of technology is certainly a double-edged sword and no better example of that is your organization’s IP network. It can identify and authenticate both logical ...
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Computer and Network Security Hardware

Convergence Q&A: Dealing with an Over-Tasked IT Department

Due to the continued acceleration of information technology advancement, many IT departments are undergoing changes and are under pressure to quickly adopt new technologies that...
Mia Papanicolaou is Chief Operations Officer for document security specialist; Striata Inc. Papanicolaou joined Striata in 2006 and having worked in Africa and the UK, now heads up North, Central and South American operations. She is a regular speaker on her areas of expertise – secure electronic document delivery and email marketing.
Information Security

CyberTech: Tips for Protecting Patient Documents in Call Centers

June 7, 2016
Attention to security details can help call centers safeguard patient information

More content from May-June 2016

Image Courtesy of BigStock.com
Most health care facilities are soft target for both physical and cyber mayhem because of their open environment, which means security strategies must be proactive and engaged.
Information Security

Confronting Healthcare Security in the 21st Century

June 7, 2016
Proactive strategies are needed to address both physical and network security threats
Image Courtesy of BigStock.com
Emergency departments require constant surveillance by security and law enforcement personnel during a disaster or public health emergency, as this is the primary “hot spot” for most hospitals.
Access Control

Security Planning for Public Health Emergencies

Having policies and contingencies in place before disaster strikes ensures safety and security of a facility
Image Courtesy of BigStock.com
The value of holding data hostage is just as profitable for criminals as trading it on the dark web and these latest threats should serve as a warning beacon to medical facilities to evaluate the systems, equipment, and processes they employ to protect sensitive information in face of the data security threats we face today.
Information Security

A Perfect Storm for Healthcare

June 7, 2016
With the proliferation of mobile and cloud technologies, healthcare data is at greater risk
Image Courtesy of Thinkstock
Panoramic camera designs provide full fields of view with no blind spots and applications are growing changing the perspective of video surveillance.
Video Surveillance

Panoramic Cameras Round Out Video Solutions

The process of selecting the right camera technology must start with a thorough understanding of the overall design objectives
The problem with conventional surveillance cameras is that they can’t include key content information. But with ‘smartware’, you can source and record video from surveillance systems, analyze the content, annotate it, then automatically organize and store all of it in one place for further research or reference.
Mobile, Vehicle, Body-Worn Surveillance

Extracting Value from Recorded Surveillance Video

June 7, 2016
Being able to manage the onslaught of video metadata is challenging for law enforcement
The entrance solution from Boon Edam serves as a vestibule for several entrances at two of the health network’s medical facilities. Automatic Entrances of Wisconsin (AEW Inc.) counts the Froedtert installations among the more than 100 Boon Edam large diameter revolving door installations that AEW Inc. has installed for medical facilities throughout the state.
Door Hardware

Wisconsin Hospitals Employ Revolving Door Solutions

June 7, 2016
Froedtert Hospital prime example of simple, yet highly successful entrance strategy to combat elements and save money
Mc Cumber, John 10517932
Information Security

Cool as McCumber: What’s the Problem Here?

June 7, 2016
Many years ago, my budding career as a consultant was deeply influenced by a lighthearted book by Gerald Weinberg: The Secrets of Consulting. Mr. Weinberg was consulting in the...
BIGBOOK cover 573a1e3e8a716
Access Control

BIG BOOK - Spring 2016

May 16, 2016
The Security Industry's Product Guide, brought to you by the publishers of Security Dealer & Integrator (SD&I), Security Technology Executive (STE) and Locksmith Ledger magazines...
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Information Security

Tech Trends: Cyber Vulnerabilities Galore

May 16, 2016
My recent trip to the RSA Conference left me with a queasy feeling for our industry