Blog Listing

Teaser Feature Image
Image of clinical devices and a tablet with a lock symbol
Partially offboarded healthcare employees: Risks and remedies
Failure to properly offboard employees exposes healthcare organizations to serious security risks. Learn about these risks and how to avoid them with identity governance.
Teaser Feature Image
Healthcare cyber threat
7 HHS best practices to mitigate healthcare cyber threats
As cyber threat frequency and severity continue to grow, the HHS has stepped into the picture.
Teaser Feature Image
Clinician burnout
3 strategies for reducing clinician burnout with EHR optimization
Clinician burnout is a serious issue with significant financial consequences.
Teaser Feature Image
Doctor typing on a laptop
HHS ruling brings new substance use disorder privacy regulations for April 2024
A recent HHS ruling aims to better align Confidentiality of Substance Use Disorder Patient Record regulations with HIPAA. Here’s a look at the changes, benefits, and challenges.
Teaser Feature Image
Data breach image
Strengthening security: 5 lessons to learn from Microsoft's recent Azure and Exchange server challenges
The recent data breach of Microsoft’s Azure platform and Exchange servers highlights the importance of proactively preparing for cyberattacks. 
Teaser Feature Image
Cyber attack image
Navigating the cybersecurity landscape of 2024: Trends and challenges ahead
The cybersecurity landscape of 2024 presents many challenges, from the rise of credential stuffing and password spraying to the expanding risk of IoT dev
Teaser Feature Image
Sean Kelly headshot
3 ways mobile devices optimize your EHR
Real-time data entry and visibility into patient status enhances care team collaboration and optimizes EHR workflows.
Teaser Feature Image
Image of clinical devices and a tablet with a lock symbol
The secret sauce for how you can have it all: More security and efficiency
This blog highlights our recent webinar: The Secret Sauce: You can have it all... more security AND efficiency. The discussion revolves around the importance of digital identity in healthcare, the role of technology in security and efficiency, and the impact of these factors on healthcare workflows.
Teaser Feature Image
Darger headshot
Imprivata Humans of Healthcare: Dana Darger, Director of Pharmacy, Rapid City Regional Hospital
Our Humans of Healthcare series aims to spotlight medical professionals—the very foundation of our healthcare system.
Teaser Feature Image
Privileged access management
Imprivata PAM updates improve security and efficiency
New enhancements for Imprivata Privileged Access Management increase control and streamline the user experience
Teaser Feature Image
Fairwarning DDI
ASHP 2023: Peer survey results on combatting drug diversion
Drug diversion continues to be one of the biggest challenges facing health system pharmacy professionals and IT security teams.
Teaser Feature Image
Image of holographic editors containing code
Staying ahead of the curve: Navigating the top 6 cybersecurity challenges of 2024
As cybersecurity risks escalate and evolve, organizations will need to be highly adaptive and proactive, while leveraging proven digital identity solutions to combat them in 2024 and beyond.
Teaser Feature Image
Cyber attack image
Cybersecurity year-end review: Two attacks that helped make 2023 the worst on record
No one is immune in this record-breaking time of cyberattacks.
Teaser Feature Image
Mobile ROI
Three reasons you're struggling to achieve a return on your mobile investments
Improve your ROI on mobile investments by understanding three of the most common factors to cause a decrease in returns: inventory shrinkage, workflow fr
Teaser Feature Image
Artificial intelligence eye
AI and privacy frameworks: Some assembly required
Now is the time to make sure your organization is prepared for the risks of AI.
Teaser Feature Image
Privileged access management
Protect corporate social media accounts with a robust privileged access management (PAM) solution
Your organization’s social media accounts can be an easy entry point for bad actors without the right access management tools. 
Teaser Feature Image
Digital fingerprint
Healthcare digital identity solutions
The alarming frequency and severity of cyberattacks have created major challenges for healthcare organizations, and repercussions stretch well beyond IT
Teaser Feature Image
Image of a doctor using a phone
Maximize mobile benefits with a new approach to end-to-end clinical mobility
Take full advantage of the economic benefits offered by shared mobile devices – without compromising security, data privacy, or user satisfaction.
Teaser Feature Image
Image of a holographic lock hovering above person's palm
Enhancing cybersecurity: Why third-party access management is needed now more than ever
As the data threat landscape continues to wreak havoc, it highlights the pressing need for dedicated third-party access security. We'll look at some of the key challenges that come into play, as well as recommendations on how to secure third-party access to protect your most sensitive data and systems from potential threats.
Teaser Feature Image
Claire Reilly headshot
Five questions with clinical: Supporting a successful mobile program
Don't let IT and clinical disconnects create gaps in mobile program planning. Learn why understanding the needs of the end user is key to successfully implementing IT solutions in clinical settings.