Blog Listing

Medical students working on a project together
If 95% of cyber-attacks are due to human error, why have so few clinicians been trained to avoid them?
New study finds a serious lack of urgency among many clinical executives regarding cybersecurity awareness.
Zero trust network access vs. least privileged access
Zero trust network access vs. least privileged access
If there’s a phrase as buzzy as Zero Trust these days, it’s least privileged access. The two sound similar in both name and concept. If you’re employing zero trust aren’t you, by default, also only granting least privileged access?
How access monitoring protects providers from health data breaches
How access monitoring protects providers from health data breaches
With the average healthcare organization going through over 2.5 million EMR accesses a day, it can be difficult for an organization to ensure those accesses are safe, all important data is secure, and that industry-specific compliance is reached.
Why having a privacy monitoring solution matters
Why having a privacy monitoring solution matters
If you’re an average size healthcare organization, the amount of EMR access happening in your network, per day, can top 2.5 million. That can be hard to fathom at first, but it makes sense.
Privacy as a competitive advantage
Privacy as a competitive advantage
As Big Tech is under attack from Congress and the public about how they handle and monetize customer private data, some companies have chosen to pivot. Instead of collecting and profiting off of consumer data, their focus is on protecting privacy. 
How to manage the access provisioning lifecycle
How to manage the access provisioning lifecycle
The Colonial Pipeline hack, in the end, came down to poor access management. The hackers found their way into operational technology (OT) through a VPN password that had never been de-provisioned. A small error that cost millions.
cyber-attack-1-318x152.png
Stay vigilant: What we can learn from the Kronos hack
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Reviewing the biggest data breaches of 2021
Reviewing the biggest data breaches of 2021
At the end of last year, we said that in 2021 ransomware would be here to stay, and the big trends will be third-party attacks and cyber terrorism. While no one likes to say “I told you, so,” especially when it comes to cybersecurity, the past 12 months saw headline after headline about ransomware attacks, third-party hacks, breaches of valuable data (like EMRs),
What to look for in enterprise access management software
What to look for in enterprise access management software
When it comes to securing internal credentials, controlling the movement of internal users, and provisioning or de-provisioning internal access rights, it can be done in-house. Enterprise access management best practices call for aligning those user rights with an internal HR system, and creating a robust access policy for internal users is do-able for most organizations, especially when it’s dealing with internal access and more routine access points (like email).
Losing sleep over cyber security insurance? How to get the coverage your HDO needs.
Losing sleep over cyber security insurance? How to get the coverage your HDO needs.
Five key questions to ensure a strong risk profile with cyber security insurers and minimize the cost of skyrocketing premiums.
Defining the different types of access control
Defining the different types of access control
While access governance is the big picture, policy-building part of Critical Access Management, access control is the double-locks and extra protections that help keep an organization’s most valuable assets safe.
Why MSPs need a critical access management option
Why MSPs need a critical access management option
Many in the managed service provider (MSP) market are turning to Imprivata to complement their security offerings by implementing a solution that lowers liability, increases efficiency of remote connections, and exceeds clients’ security, audit, and compliance needs.
Termination gap: a major insider threat
Termination gap: a major insider threat
The termination gap can cause all kinds of trouble. That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur -- including a malicious breach by that internal user -- and the truth is, organizations aren’t worrying enough about it. 
Here's why critical infrastructure keeps getting hacked
Here's why critical infrastructure keeps getting hacked
Every organization will be quick to say that their systems are secure, and a breach won’t happen. In fact, according to a recent report by Skybox Security, 73% of CIOs and CISOs are "highly confident" they will not suffer an operational technology breach in the next 12 months.
Privileged access management checklist: 20 questions to ask
Privileged access management checklist: 20 questions to ask
Thinking about implementing a privileged access management solution? With security threats on the rise and more people working remotely, it’s critical that companies lock down and monitor privileged accounts. This makes it harder for hackers to access your most sensitive data and systems.
Three ways to determine critical versus routine access
Three ways to determine critical versus routine access
There’s one question every organization needs to be able to answer: What are the company’s specific critical access points? It’s easier asked than answered, and depending on the system, the users, the assets, and a few other factors, critical access varies by organization and use case.
Enterprise password vault vs. privileged access management
Enterprise password vault vs. privileged access management
When it comes to securing privileged credentials, companies often turn to enterprise password managers or privileged access management solutions. This leads organizations to ask, “Which solution is best?"
How critical access management protects three industries from cyber threats
How critical access management protects three industries from cyber threats
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
rushed-inside-hospital
Clinicians on the move: Is there more to the healthcare exodus than COVID-19?
It’s time to consolidate and automate identity governance. See 10 reasons why.
How critical access management protects government entities from cyber threats
How critical access management protects government entities from cyber threats
Every 11 seconds, a company falls victim to a ransomware attack. Compromised protected personal data resulted in 1.8 HIPAA privacy violations per day in 2020. The cost of cyber attacks globally in 2021, according to Cybersecurity Ventures, is expected to cost $20 billion.