Blog Listing

Positive patient identification in the time of COVID-19
As the volume of patients seeking medical attention increases during these challenging times, correct patient data is more important than ever.
Provider systems face a new crisis from COVID-19: Staffing
Staffing has emerged as one of the most pressing challenges for provider systems dealing with the global COVID-19 crisis.
The value of a vendor management platform
The success of business projects and the associated technology solutions to implement them are almost always graded on how much return on investment (ROI) they deliver back to the business for the investment required.
Teaser Feature Image
Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
COVID-19: Our house is on fire
On my last ER shift, the nurses and I were discussing how all-consuming the COVID-19 crisis is becoming for hospital leadership and front line staff alike...
NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Teaser Feature Image
Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
A message from Dr. Sean Kelly, Chief Medical Officer, Imprivata
Teaser Feature Image
Monthly Healthcare News Roundup: The Cost of Insider Security Breaches, CTA’s New Healthcare AI Standard, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the cost of insider security breaches, the Consumer Technology...
Boost manufacturing security with a vendor access management strategy
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Five ways cyber attacks put manufacturing systems at risk
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
Teaser Feature Image
The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them
With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Why you need third-party risk management in manufacturing
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Teaser Feature Image
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
Teaser Feature Image
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.
Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Imprivata OneSign 7.1 Introduces Secure Walkaway Technology
Imprivata, the healthcare digital identity company, has been at the forefront of digital transformation in healthcare.
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Considerations in your IAAM journey - Part III: What should I manage in my IDG system?
Before you read, catch up on Part 0: An IAAM system overview and
Why third-party risk management matters
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.