Blog Listing

Why having a privacy monitoring solution matters
If you’re an average size healthcare organization, the amount of EMR access happening in your network, per day, can top 2.5 million. That can be hard to fathom at first, but it makes sense.
Privacy as a competitive advantage
As Big Tech is under attack from Congress and the public about how they handle and monetize customer private data, some companies have chosen to pivot. Instead of collecting and profiting off of consumer data, their focus is on protecting privacy. 
How to manage the access provisioning lifecycle
The Colonial Pipeline hack, in the end, came down to poor access management. The hackers found their way into operational technology (OT) through a VPN password that had never been de-provisioned. A small error that cost millions.
Teaser Feature Image
cyber-attack-1-318x152.png
Stay vigilant: What we can learn from the Kronos hack
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Reviewing the biggest data breaches of 2021
At the end of last year, we said that in 2021 ransomware would be here to stay, and the big trends will be third-party attacks and cyber terrorism. While no one likes to say “I told you, so,” especially when it comes to cybersecurity, the past 12 months saw headline after headline about ransomware attacks, third-party hacks, breaches of valuable data (like EMRs),
What to look for in enterprise access management software
When it comes to securing internal credentials, controlling the movement of internal users, and provisioning or de-provisioning internal access rights, it can be done in-house. Enterprise access management best practices call for aligning those user rights with an internal HR system, and creating a robust access policy for internal users is do-able for most organizations, especially when it’s dealing with internal access and more routine access points (like email).
Losing sleep over cyber security insurance? How to get the coverage your HDO needs.
Five key questions to ensure a strong risk profile with cyber security insurers and minimize the cost of skyrocketing premiums.
Defining the different types of access control
While access governance is the big picture, policy-building part of Critical Access Management, access control is the double-locks and extra protections that help keep an organization’s most valuable assets safe.
Why MSPs need a critical access management option
Many in the managed service provider (MSP) market are turning to Imprivata to complement their security offerings by implementing a solution that lowers liability, increases efficiency of remote connections, and exceeds clients’ security, audit, and compliance needs.
Termination gap: a major insider threat
The termination gap can cause all kinds of trouble. That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur -- including a malicious breach by that internal user -- and the truth is, organizations aren’t worrying enough about it. 
Here's why critical infrastructure keeps getting hacked
Every organization will be quick to say that their systems are secure, and a breach won’t happen. In fact, according to a recent report by Skybox Security, 73% of CIOs and CISOs are "highly confident" they will not suffer an operational technology breach in the next 12 months.
Privileged access management checklist: 20 questions to ask
Thinking about implementing a privileged access management solution? With security threats on the rise and more people working remotely, it’s critical that companies lock down and monitor privileged accounts. This makes it harder for hackers to access your most sensitive data and systems.
Three ways to determine critical versus routine access
There’s one question every organization needs to be able to answer: What are the company’s specific critical access points? It’s easier asked than answered, and depending on the system, the users, the assets, and a few other factors, critical access varies by organization and use case.
Enterprise password vault vs. privileged access management
When it comes to securing privileged credentials, companies often turn to enterprise password managers or privileged access management solutions. This leads organizations to ask, “Which solution is best?"
How critical access management protects three industries from cyber threats
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
Teaser Feature Image
rushed-inside-hospital
Clinicians on the move: Is there more to the healthcare exodus than COVID-19?
It’s time to consolidate and automate identity governance. See 10 reasons why.
How critical access management protects government entities from cyber threats
Every 11 seconds, a company falls victim to a ransomware attack. Compromised protected personal data resulted in 1.8 HIPAA privacy violations per day in 2020. The cost of cyber attacks globally in 2021, according to Cybersecurity Ventures, is expected to cost $20 billion.
How to define critical access: Frequency, risk, and urgency
Understanding critical information, critical access points, and how to best employ critical access management begins with three key aspects: frequency, risk, and urgency.
Defining the different types of insider threats
As technology continues to evolve, cyberattacks are becoming more sophisticated. Many organizations focus their cybersecurity efforts only on outsider threats, hence creating more loopholes for insider threats. These companies don’t see the possibility of losing sensitive data due to negligence or the malicious intent of their own people.
Teaser Feature Image
killerware_photo
From ransomware to killware: Is the future of cyberattacks turning more sinister?
HDOs have witnessed ransomware’s danger to patient health for years. But is killware the next big threat?