Blog Listing

How enterprise access helps achieve compliance
How enterprise access helps achieve compliance
Third parties continue to be one of the biggest cybersecurity risks to an organization. Last year, nearly half of organizations experienced a data breach caused by a third party and with ransomware on the rise, businesses need to lock down their third-party security strategy before a hacker finds a vulnerable access point.
Imprivata Hires Sign
Hiring globally in a Zoom world
Recruiting at Imprivata continues to be a top priority, even as our entire workforce remains remote.
Health and Wellness Awards
Imprivata's commitment to health and wellness
Imprivata is honored to be named to Comparably’s list of large companies with the best perks & benefits and best company culture.
Why We Love Imprivata Thumbnail
Why we love Imprivata!
While it’s easy for us to show you what makes Imprivata a great place to work, we asked our team what they love most about Imprivata, here’s what they had to say
Two people viewing statistics from an iPad
Inside the cyber insurance application process
The Imprivata team shares lessons learned from recent completion of the cyber insurance application process. Start early and be ready and transparent.
Benefits of credential vaulting
Benefits of credential vaulting
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.
Why multi-factor authentication isn't enough to secure enterprises
Why multi-factor authentication isn't enough to secure enterprises
A couple of decades ago, I received my first “authenticator” while working at Indiana University. As explained to me then, the device generated a secure token that only it and the server would know about. In this way, the servers I was helping to support would know that the bearer of that device (me) was legit.
Cybersecurity for smart factories in manufacturing
Cybersecurity for smart factories in manufacturing
The fourth industrial revolution has arrived. Also called industry 4.0, this term refers to the rise of smart factories and how manufacturing as an industry is quickly transitioning from place-based warehouses to networks of global software, automated systems, OT, and integration of the internet of things to manufacture anything and everything in entirely new ways.
Ransomware is only increasing: is your organization protected?
Ransomware is only increasing: is your organization protected?
Ransomware has existed as long as the internet has. From phishing scams to system takeovers to cyber espionage, hackers and bad actors have figured out that ransomware is both easy and profitable. It’s so profitable, in fact, that ransomware attacks have doubled in each of the last two years, and account for 22 percent of all 2021 cyber attacks.
You need decentralized cybersecurity to match decentralized attacks
You need decentralized cybersecurity to match decentralized attacks
The world of cybersecurity is rapidly changing. Hackers are getting smarter and more sophisticated, and in the age of remote work, globalization, and endless third-party connections, attack methods and motivations are changing. Organizations need to pay attention.
Is your tinder date snooping on your electronic medical records?
Is your tinder date snooping on your electronic medical records?
With Imprivata FairWarning, your organization will be equipped with the tools necessary to ensure compliance and keep your data safe from any prying eyes.
'Hack one, breach many' is here to stay: how to secure your third-party risks
'Hack one, breach many' is here to stay: how to secure your third-party risks
The numbers tell a scary story. When polled by Ponemon, 44% of organizations say they’ve experienced a third-party data breach in the last year. In addition, 65% of respondents have not identified the third parties with access to their most sensitive data and 51% stated that their organizations are not assessing the security and privacy practices of the third parties that are granted access to their systems.
Four ways covered entities can ensure hipaa compliance
Four ways covered entities can ensure hipaa compliance
Every healthcare organization knows about the Health Insurance Portability and Accountability Act (HIPAA). It’s part of daily life for those working in a healthcare setting, and it can be — from a cybersecurity perspective — a difficult set of regulations to navigate.
How artificial intelligence benefits access control systems
How artificial intelligence benefits access control systems
With a single healthcare system averaging 2.5 million EMR accesses a day, it’s safe to say that access control can be an overwhelming task for an organization to manage.
Why enterprise access is a superior VPAM system
Why enterprise access is a superior VPAM system
The digital world today is all about access. Third parties are accessing software programs, systems, and assets remotely. Employees are accessing servers and data from coffee shops, vacation homes, and even on the road. But more access inherently means more risk.
Image of a zero trust security model
Biden administration’s new cybersecurity directive champions Zero Trust
It’s the year of Zero Trust. For your strategy to succeed, be sure to put digital identity at its core. Here’s why.
Medical students working on a project together
If 95% of cyber-attacks are due to human error, why have so few clinicians been trained to avoid them?
New study finds a serious lack of urgency among many clinical executives regarding cybersecurity awareness.
Zero trust network access vs. least privileged access
Zero trust network access vs. least privileged access
If there’s a phrase as buzzy as Zero Trust these days, it’s least privileged access. The two sound similar in both name and concept. If you’re employing zero trust aren’t you, by default, also only granting least privileged access?
How access monitoring protects providers from health data breaches
How access monitoring protects providers from health data breaches
With the average healthcare organization going through over 2.5 million EMR accesses a day, it can be difficult for an organization to ensure those accesses are safe, all important data is secure, and that industry-specific compliance is reached.
Why having a privacy monitoring solution matters
Why having a privacy monitoring solution matters
If you’re an average size healthcare organization, the amount of EMR access happening in your network, per day, can top 2.5 million. That can be hard to fathom at first, but it makes sense.