Blog

Image of a shield with a target, with arrows struck at the bullseye
10 reasons why hackers think your HDO is an easy target
And why many CIOs are choosing managed services to bridge the IT resource gap and boost security. Even before the pandemic, CIOs at most healthcare
Thumbnail image of the SecureLink blog
We’re expanding the Imprivata family: Welcome, SecureLink!
We’re thrilled to be welcoming SecureLink, the leader in critical access management, to the Imprivata family!
Image of an abstract web of fingerprints and red lines connecting them
Staving off March (security) madness: Digital identity management is your key defense strategy
I know you don’t really need reminding, but here it is anyway: the security of your organization needs to be top of mind. Always.
Two people viewing statistics from an iPad
Inside the cyber insurance application process
The Imprivata team shares lessons learned from recent completion of the cyber insurance application process. Start early and be ready and transparent.
Why We Love Imprivata Thumbnail
Why we love Imprivata!
While it’s easy for us to show you what makes Imprivata a great place to work, we asked our team what they love most about Imprivata, here’s what they had to say
Image of a zero trust security model
Biden administration’s new cybersecurity directive champions Zero Trust
It’s the year of Zero Trust. For your strategy to succeed, be sure to put digital identity at its core. Here’s why.
Medical students working on a project together
If 95% of cyber-attacks are due to human error, why have so few clinicians been trained to avoid them?
New study finds a serious lack of urgency among many clinical executives regarding cybersecurity awareness.
Health and Wellness Awards
Imprivata's commitment to health and wellness
Imprivata is honored to be named to Comparably’s list of large companies with the best perks & benefits and best company culture.
cyber-attack-1-318x152.png
Stay vigilant: What we can learn from the Kronos hack
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Losing sleep over cyber security insurance? How to get the coverage your HDO needs.
Losing sleep over cyber security insurance? How to get the coverage your HDO needs.
Five key questions to ensure a strong risk profile with cyber security insurers and minimize the cost of skyrocketing premiums.
Enterprise password vault vs. privileged access management
Enterprise password vault vs. privileged access management
When it comes to securing privileged credentials, companies often turn to enterprise password managers or privileged access management solutions. This leads organizations to ask, “Which solution is best?"
rushed-inside-hospital
Clinicians on the move: Is there more to the healthcare exodus than COVID-19?
It’s time to consolidate and automate identity governance. See 10 reasons why.
killerware_photo
From ransomware to killware: Is the future of cyberattacks turning more sinister?
HDOs have witnessed ransomware’s danger to patient health for years. But is killware the next big threat?
The value of AI and ML for healthcare privacy, security, and compliance
The value of AI and ML for healthcare privacy, security, and compliance
If you’re a Chief Compliance or Chief Privacy Officer at a health delivery organization (HDO), you understand first-hand how critical it is to secure and protect your organization’s information. To succeed in a heavily regulated industry like healthcare, you must establish a culture that constantly strives for data protection, risk reduction, and across-the-board compliance.
Mesh of connected devices and modalities
Easing password pains: How CISOs can implement real, complex passwords and keep clinicians happy
In a previous post, I talked about complex passwords and how to strike the right balance between security and clinical workflow efficiency. And with breaches continuing to be on the rise – more than a 50% increase in healthcare in 2020 – that message rings true more than ever.
Microsoft Power Apps breach exposes third party security vulnerabilities
Microsoft Power Apps breach exposes third party security vulnerabilities
Take the ten-question reality check: How confident are you in your ability to protect customer data?
wes-wright
T-Mobile breach exposed data of 40 million: How safe is your customers’ personal information?
Without a “defense in depth” security strategy you risk losing much more than customer data.
Rachel-pickering
Straight to care with Enterprise Password AutoFill for iOS apps, only with Imprivata GroundControl
We are excited to share the release of Imprivata GroundControl with Enterprise Password Au
Identity maturity means healthcare security. How does your strategy measure up?  Find out now with our new assessment tool.
Identity maturity means healthcare security. How does your strategy measure up? Find out now with our new assessment tool.
Healthcare delivery organizations (HDOs) have witnessed the evolution of increasingly complex IT environments – with escalating numbers of users and roles, l
2021-best-company-leadership
Imprivata earns best leadership, A+ culture honors
It’s official: Imprivata has earned a Comparably Award for Best Leadership Teams for the second year in a row.