Blog Listing

HIPAA regulation image
Third-party access control in healthcare is key to avoiding regulatory noncompliance and fines
Safeguarding patient data is critical for healthcare organizations. Strong cybersecurity protects patients and avoids regulatory noncompliance.
Image of someone holding a phone with a lock sign
Cultivating digital resilience: The crucial role of cyber hygiene, Part 1
In this climate of pervasive security threats and attacks, good cyber hygiene can bolster your organization's defenses, protect sensitive data, and build digital resilience.
Facial recognition technology
Patient misidentification is a huge problem, and biometric technology holds the solution
Patient misidentification is on the rise and can have deadly consequences. Find out more about this problem, and why facial biometrics are the solution.
Image of clinical devices and a tablet with a lock symbol
Partially offboarded healthcare employees: Risks and remedies
Failure to properly offboard employees exposes healthcare organizations to serious security risks. Learn about these risks and how to avoid them with identity governance.
Healthcare cyber threat
7 HHS best practices to mitigate healthcare cyber threats
As cyber threat frequency and severity continue to grow, the HHS has stepped into the picture.
Clinician burnout
3 strategies for reducing clinician burnout with EHR optimization
Clinician burnout is a serious issue with significant financial consequences.
Doctor typing on a laptop
HHS ruling brings new substance use disorder privacy regulations for April 2024
A recent HHS ruling aims to better align Confidentiality of Substance Use Disorder Patient Record regulations with HIPAA. Here’s a look at the changes, benefits, and challenges.
Data breach image
Strengthening security: 5 lessons to learn from Microsoft's recent Azure and Exchange server challenges
The recent data breach of Microsoft’s Azure platform and Exchange servers highlights the importance of proactively preparing for cyberattacks. 
Cyber attack image
Navigating the cybersecurity landscape of 2024: Trends and challenges ahead
The cybersecurity landscape of 2024 presents many challenges, from the rise of credential stuffing and password spraying to the expanding risk of IoT dev
Sean Kelly headshot
3 ways mobile devices optimize your EHR
Real-time data entry and visibility into patient status enhances care team collaboration and optimizes EHR workflows.
Image of clinical devices and a tablet with a lock symbol
The secret sauce for how you can have it all: More security and efficiency
This blog highlights our recent webinar: The Secret Sauce: You can have it all... more security AND efficiency. The discussion revolves around the importance of digital identity in healthcare, the role of technology in security and efficiency, and the impact of these factors on healthcare workflows.
Darger headshot
Imprivata Humans of Healthcare: Dana Darger, Director of Pharmacy, Rapid City Regional Hospital
Our Humans of Healthcare series aims to spotlight medical professionals—the very foundation of our healthcare system.
Privileged access management
Imprivata PAM updates improve security and efficiency
New enhancements for Imprivata Privileged Access Management increase control and streamline the user experience
Fairwarning DDI
ASHP 2023: Peer survey results on combatting drug diversion
Drug diversion continues to be one of the biggest challenges facing health system pharmacy professionals and IT security teams.
Image of holographic editors containing code
Staying ahead of the curve: Navigating the top 6 cybersecurity challenges of 2024
As cybersecurity risks escalate and evolve, organizations will need to be highly adaptive and proactive, while leveraging proven digital identity solutions to combat them in 2024 and beyond.
Cyber attack image
Cybersecurity year-end review: Two attacks that helped make 2023 the worst on record
No one is immune in this record-breaking time of cyberattacks.
Mobile ROI
Three reasons you're struggling to achieve a return on your mobile investments
Improve your ROI on mobile investments by understanding three of the most common factors to cause a decrease in returns: inventory shrinkage, workflow fr
Artificial intelligence eye
AI and privacy frameworks: Some assembly required
Now is the time to make sure your organization is prepared for the risks of AI.
Privileged access management
Protect corporate social media accounts with a robust privileged access management (PAM) solution
Your organization’s social media accounts can be an easy entry point for bad actors without the right access management tools. 
Digital fingerprint
Healthcare digital identity solutions
The alarming frequency and severity of cyberattacks have created major challenges for healthcare organizations, and repercussions stretch well beyond IT