Blog Listing

The intersection of compliance and third parties: How to stay compliant
The intersection of compliance and third parties: How to stay compliant
Let’s face it: When it comes to data security, ensuring your company’s compliance can be a headache, no matter the industry. Unfortunately, this problem is made even worse by the realization that compliance requirements extend beyond your internal operations.
What is an electronic medical record auditing tool and why should you implement it?
What is an electronic medical record auditing tool and why should you implement it?
Compliance teams in healthcare organizations have the important task of ensuring patient data is protected from unwarranted access. It is a crucial job within the organization, due to the fact that it is difficult to restrict access to medical workers in the healthcare setting, and restricting access to EMRs could make it more difficult for them to do their daily, or emergency-related tasks.
Zero trust for insider access
Zero trust for insider access
If you’re in the cybersecurity field, chances are you’ve heard of the castle-and-moat strategy of securing sensitive systems. This strategy focuses on securing the castle (or sensitive system) from external threats while placing minimal controls on trusted insiders.
Vulnerabilities lead to supply chain hacking
Vulnerabilities lead to supply chain hacking
When it comes to supply chain hacks, it’s not a matter of if, it’s a matter of when your organization will be hacked. Attacks on critical infrastructure and systems are on the rise, and with hackers gaining skill and in some cases getting paid out through ransomware attacks, that trajectory of supply chain hacking is only headed upwards.
Why cloud deployment solutions are your best bet for access management
Why cloud deployment solutions are your best bet for access management
The consensus is clear -- cloud deployment is the future of third-party access management. With increased security, the fact that most of the programs and data third parties access are already on the cloud, and many more benefits, switching to a cloud-first approach makes more sense than ever.
Identity maturity means healthcare security. How does your strategy measure up?  Find out now with our new assessment tool.
Identity maturity means healthcare security. How does your strategy measure up? Find out now with our new assessment tool.
Healthcare delivery organizations (HDOs) have witnessed the evolution of increasingly complex IT environments – with escalating numbers of users and roles, locations, devices, and applications. All of which came with challenges exacerbated by the relentless disruptions of the COVID era.
Rachel-pickering
Straight to care with Enterprise Password AutoFill for iOS apps, only with Imprivata GroundControl
Without a “defense in depth” security strategy you risk losing much more than customer data.
2021-best-company-leadership
Imprivata earns best leadership, A+ culture honors
It’s official: Imprivata has earned a Comparably Award for Best Leadership Teams for the second year in a row. And, this year, we were recognized in the Large Companies category – a testament to our continued growth and success!
Benefits of multi-factor authentication (MFA)
Benefits of multi-factor authentication (MFA)
A crucial aspect of cybersecurity was missing from Colonial Pipeline when a criminal hacking group was able to access a shared internal drive and demanded close to $5 million in exchange for the files: multi-factor authentication.
wes-wright
You need complex passwords. Clinicians don’t. Here’s how to strike the right balance.
It seems like every year we hear that cyberattacks and ransomware in hospitals are on the rise. Unfortunately, it’s true every year. In fact, during the first 10 months of 2020, the number of reported breaches rose 18% over the same period in 2019.
How to protect patient data & privacy
How to protect patient data & privacy
Protecting patient data is a Herculean task for healthcare organizations, as protections must be in place for internal and external threats. On top of that, HIPAA regulations add in a layer of required parameters that healthcare organizations must have in place to be compliant and not face penalties.
Why partners should consider zero trust network access (ZTNA) for third-party remote access
Why partners should consider zero trust network access (ZTNA) for third-party remote access
According to the 2021 Executive Order, “Zero Trust Architecture allows users full access but only to the bare minimum they need to perform their jobs. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.”
Hackers, breaches, and the value of healthcare data
Hackers, breaches, and the value of healthcare data
Healthcare data breaches are increasing exponentially year after year, and it doesn’t seem like they’re going to slow down any time soon. It’s important for healthcare IT professionals to take steps to safeguard their systems, whether that means protecting against external threats posed by hackers and cyber criminals or securing internal threats that come from access abuse from internal users.
What is zero trust architecture?
What is zero trust architecture?
If you’re in the cybersecurity field, chances are you’ve come across Zero Trust architecture (or any variants of it) enough to know what Zero Trust means. Essentially, the Zero Trust cybersecurity approach is kicking old methods to the curb while embracing the basic principles of security.
Positive patient identification improves patient safety, security, and experience
Positive patient identification improves patient safety, security, and experience
Positive patient identification is a challenge for many healthcare delivery organizations (HDOs). Studies show that about 10% of patients are misidentified when they check in for medical care. Patient misidentification can impact patient experience, erode patient trust, and lead to harmful and sometimes even fatal medical errors.
What’s ahead for AI and machine learning in healthcare?
What’s ahead for AI and machine learning in healthcare?
In recent years, we have seen increased interest and adoption of machine learning (ML) and artificial intelligence (AI) technology in healthcare.
How to build a successful EMR access monitoring process
How to build a successful EMR access monitoring process
Monitoring is the 5th element of the 7 elements of an effective compliance program. It is a continuous task that compliance and privacy teams must do to ensure any inappropriate accesses are detected and resolved in a timely manner.
Hospitals spend more after a data breach, but there is a fix
Hospitals spend more after a data breach, but there is a fix
Two recently published reports discuss the high cost of healthcare data breaches organizations can incur. The Department of Health and Human Services estimates that it takes a breached healthcare organization a full year to recover.
The National Institute of Standards and Technology privacy framework
The National Institute of Standards and Technology privacy framework
The National Institute of Standards and Technology (NIST) has released a request for infor
Managing insider threats in healthcare
Managing insider threats in healthcare
Often when discussing common healthcare security threats, external breaches are the main focus.