Blog Listing

What is third-party remote access?
What is third-party remote access?
Risk management is critical for any company looking for growth and profit instead of liabilities and reputational damages. So let's answer an important question: What is third-party remote access, and why should you care? Networks can be attacked from all sides.
In the COVID-19 battle, did we leave our best players on the bench?
In the COVID-19 battle, did we leave our best players on the bench?
When it comes to battling COVID-19, did we leave our best players on the bench?
How reputational damage from a data breach affects consumer perception
How reputational damage from a data breach affects consumer perception
Conversations regarding cyberattacks are often limited to the organization that suffered reputational damage from a data breach. We talk about what led to the cyberattack, how it was found and reported, and the associated costs.
Monthly Cloud Security Roundup: The Impact of COVID-19 on Cybersecurity, Managing Remote Employee Risks, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the impact of COVID-19 on cybersecurity, the...
Monthly Healthcare News Roundup: Top 10 Children’s Hospitals in the US, Maintaining Cybersecurity During a Crisis, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the top 10 children’s hospitals in the US, maintaining cybersecurity...
Consumer password habits: Concerning, but not surprising
Consumer password habits: Concerning, but not surprising
Whether it’s a sticky note, a phone app, or keeping a password saved on your computer, we don’t always take all the precautions that we should to keep our password a secret from others.
Implementing role-based access controls for third-party access
Implementing role-based access controls for third-party access
Role-Based Access Control, or RBAC as it’s commonly referred to, is one of the types of access control that has been considered a core best practice for organizations to protect their IT assets for a long time.
Key elements of third-party remote access audit controls
Key elements of third-party remote access audit controls
I have written often about the three main principles of sound Third-Party Risk Management (TPRM); they are identify, control and audit. By using these three basic control areas, risk from third parties to organizations can be greatly reduced.
How do companies get hacked?
How do companies get hacked?
It's not a matter of if your company will be hacked - but when. Planning and ongoing preparation is the ultimate protection against cyber-attacks. Our guest blogger and cybersecurity expert, Marco Essomba, explores seven reasons companies get hacked.
Guiding Salesforce Security Priorities with the 2020 Verizon Data Breach Investigations Report
Salesforce Security Architect and former author of the Verizon Data Breach Investigations Report Kevin Thompson offers key insights from the 2020 DBIR.
Are you getting the most from your IT investments?
Are you getting the most from your IT investments?
Study conducted by Forrester Consulting shows customers receive a 336% ROI with Imprivata digital identity solutions
How to catalog vendors with access to your network
How to catalog vendors with access to your network
Working with vendors, business partners, and other third parties is a fact of life for most organizations. However, once vendors are selected, vetted, and onboarded, they will often be given remote access to your network, and that’s where problems can arise.
IoT and vendors: how to stay safe with remote access
IoT and vendors: how to stay safe with remote access
The internet of things, or IoT, is growing faster than a weed in the summertime. This catch-all name covers everything from your front door security cameras to factory floor control devices, often called the industrial internet of things (IIoT).
How to Overcome Unprecedented Business Challenges Using Salesforce
With Salesforce, you can take times of change and turn them into opportunities. This whitepaper offers ways to establish a robust infrastructure, cut costs, and secure data using Salesforce.
COVID Crisis: How Children’s Hospital of the King’s Daughters responded
COVID Crisis: How Children’s Hospital of the King’s Daughters responded
How are healthcare organizations dealing with the effects of COVID-19? I recently had the opportunity to moderate a panel on the topic with two members of the strategic IT leadership team at Children’s Hospital of the King’s Daughters (CHKD) in Norfolk, Virginia: Dr. Dean Cauley, CMIO, and Joseph Hooks, CTO and CISO.
Are your vendors compromising your compliance?
Are your vendors compromising your compliance?
When the European Union’s comprehensive privacy legislation, the General Data Prote
Imprivata PatientSecure  today: assessing risks vs. benefits
Imprivata PatientSecure  today: assessing risks vs. benefits
As a practicing emergency physician and the Chief Medical Officer at Imprivata, I know that the last eight weeks have been challenging for all of us. And the challenges will continue; but we are adapting and making progress day by day. As we continue to find our way to a “new normal,” I ask you to please consider this: In healthcare, we are always assessing RISKS versus BENEFITS.
Active directory is not the silver bullet for IAM best practices
Active directory is not the silver bullet for IAM best practices
Microsoft’s Active Directory (AD), the most dominant directory service for handling logins and other administrative functions on Windows networks has been a godsend for many IT administrators looking for a one-stop-shop to handle the Identity Access Management (IAM) functions within their organizations.
Monthly Cloud Security Roundup: The Rise in Insider Threats, The #1 Brand for Phishing Attacks, and More
Discover the latest cloud security news with April’s roundup, including the rise in insider threats, the #1 brand for phishing attacks, and more.
OneSign 4.6 SP1
OneSign 4.6 SP1
Imprivata is pleased to announce general availability of OneSign 4.6 SP1!