Skip to content
  • Home
  • News
  • About
  • Contact
  • CA Login
Top Utility Menu
Twitter page opens in new windowLinkedin page opens in new window
Search:
Threat Analysis Group
Threat Analysis Group
Threat Analysis GroupThreat Analysis Group
  • Security
    Metrics
  • Risk
    Management
  • Security
    Operations
  • Forensic
    Security
  • Security
    Technology
  • Publications
    & Research
  • Security
    Metrics
  • Risk
    Management
  • Security
    Operations
  • Forensic
    Security
  • Security
    Technology
  • Publications
    & Research

Category Archives: Healthcare Security

You are here:
  1. Home
  2. Category "Healthcare Security"

IAHSS 2011 Conference

Healthcare SecurityJanuary 13, 2011

IAHSS and the Ontario Chapter will host the 43rd Annual General Membership Meeting and Seminar Program May 22-25, 2011 at…

Read more

WSJ: Hospital employee allegedly steals $3.8 million

Healthcare SecurityDecember 4, 2010

The internal threat, while not unique to the health care environment, is pervasive and can have a significant impact on…

Read more

Active Shooter Guidance for Hospitals

Healthcare SecurityDecember 3, 2010

According to the California Hospital Association, “An active shooter is defined as an individual who appears to be actively engaged…

Read more

An example of a Hospital Active Shooter Drill gone bad

Healthcare SecurityNovember 11, 2010

“An off-duty cop pretending to be a terrorist stormed into a hospital intensive care unit brandishing a handgun, which he…

Read more

ER Nurses fear more assaults as programs cut

Healthcare SecurityAugust 12, 2010

Nurses fear even more ER assaults as programs cut By JULIE CARR SMYTH (AP) COLUMBUS, Ohio — Emergency room nurse…

Read more

California Department of Public Health addresses hospital security

Healthcare SecurityJuly 28, 2010

The law requires, after July 1, 2010, all licensed GACHs, APHs, and SHs to conduct, not less than annually, a…

Read more
←1
23
…45678→
Threat Analysis Group
© Threat Analysis Group, LLC - All rights reserved.

Experts in Security Risk Reduction and Evidence-Based Outcomes
(281) 494-1515info [at] threatanalysis.com

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Go to Top