Blog Listing

4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports
What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.
4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do
To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.
4 Data Governance Best Practices for Healthcare Organizations
Governance is an essential aspect of healthcare organizations. Explore these 4 data governance best practices to better understand how organizations can boost compliance, prevent breaches, and more.
3 Ways Patient Privacy Monitoring Impacts Lives and Reduces the Cost of Data Breaches in the Healthcare Industry
Data breaches in the healthcare industry cost 2,100 lives and $4 billion annually. Read these 3 ways to protect both patient privacy and safety.
3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do
Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.
3 Must-Have Capabilities Organizations Should Have to Prevent Data Theft in the Cloud in 2018
What tools and resources do you need to prevent mission-critical data from leaving your CRM? Discover three critical assets you should add to your security posture now.
2019 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts
What captivated CISOs, IT directors, Salesforce admins, and other cloud security readers this year? Find out with our 2019 year in review.
Top HIMSS19 Sessions: Where We’ll Be This Week
As HIMSS19 ramps up, there are always far more sessions than any one person has time to attend. Here are the top HIMSS19 sessions we're most excited for at Imprivata FairWarning, including a few hot topics...
Why governments need secure third-party remote access
Why governments need secure third-party remote access
Take a moment to think about the fallout of a government data breach. Security systems threatened. Federal departments, like the Treasury and State departments, compromised. Constituents’ trust displaced. Unfortunately, this was a reality for the U.S. government in late 2020.
The value of PAM integrations with a credential vault
The value of PAM integrations with a credential vault
Imprivata's mission is to make third-party remote access as comprehensive and powerful as possible. To achieve this, our product integrates with a number of other cybersecurity programs and applications to make our customer’s experience as secure and efficient as possible.
VPNs and desktop sharing slow you down and put you at risk
VPNs and desktop sharing slow you down and put you at risk
When you think about providing remote access to your network, VPNs and desktop sharing are the two most frequently used methods. VPNs are great for allowing access to local resources, but they present challenges for access for third-party vendors.
How to build a highly secure company network
How to build a highly secure company network
News broke recently that a water plant in Florida, which provides water to businesses and around 15,000 residents, was permeated by a hacker. The hacker increased the amount of sodium hydroxide in the water treatment system to more than 10,000% of the normal ratio.
Is it time to rethink your third-party remote access platform?
Is it time to rethink your third-party remote access platform?
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.
Healthcare Roundup: HIPAA Safe Harbor Bill, HIPAA Penalties Lifted, Takedown of Cyber Threats, and Biden's Cybersecurity Team
From the HIPAA Safe Harbor bill becoming law and the OCR lifting HIPAA penalties to the takedown of cyber threats and Biden’s cybersecurity team, read the most pressing healthcare news in this post.
Cloud Security Roundup: Microsoft 365 Phishing Attacks, Washington’s Potential Privacy Law, and More
Discover the latest cloud security news, including Microsoft 365 phishing attacks, the U.S.’ new cyber protection group, and more.
How vendors can navigate the challenges of remote support
How vendors can navigate the challenges of remote support
Way back in 2018, we conducted a survey that found that for every technology vendor there are 239 customers who rely on their support. Sure, you're probably thinking that 2018 happened so long ago that you don't even remember what was going on before then, right?
4 key differences between consumer and enterprise biometrics (Part 1)
4 key differences between consumer and enterprise biometrics (Part 1)
By now, we’re all pretty familiar with biometrics as a way to measure a person's physical characteristics to verify their identity. Most of us use biometrics daily to log in to our mobile devices via a fingerprint or face scan or to activate a home personal assistant device like Amazon Alexa or Google Home using our voice. These are popular methods of consumer biometrics.
The importance of HIPAA-compliant remote access and third parties
The importance of HIPAA-compliant remote access and third parties
Though most are very familiar with the Health Insurance Portability and Accountability Act (HIPAA) and its relation to third parties and remote access, we're going to break it down a bit. HIPAA carries with it data privacy requirements for individuals, organizations, and entities working with patient information.
Healthcare Roundup: Top Privacy and Security Stories of 2020, Global Supply-Chain Cyberattacks, Changes to HIPAA's Privacy Rule, and More
From the top privacy and security stories of 2020 and global supply-chain cyberattacks to the proposed modifications to the HIPAA Privacy Rule and more, read the most pressing healthcare news here.
Cloud Security Roundup: SolarWinds Breach, Twitter’s GDPR Fine, WFH Insider Threats, and More
Discover the latest cloud security news, including, SolarWinds breach, Twitter’s $500k GDPR fine, WFH insider threats, and more.