From the recent Ryuk ransomware attacks on U.S. hospitals to the delay to the ONC information blocking requirements deadline, and more, read the most pressing healthcare news in this post.…
The continued importance of patient identification during COVID-19
By Rebecca Slisz
|
The COVID-19 pandemic is placing an enormous burden and stress on our entire healthcare system -- from strained ICUs and a lack of adequate personal protective equipment (PPE) to grossly inadequate testing and inaccurate reporting systems.…
Why efficiency and security are more important than ever for vendor access management
We're not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing, as vendors often offer an easier way into your network than a full-frontal assault on your defenses.…
Imprivata FairWarning convened a Roundtable of Directors of Pharmacy to discuss drug diversion - the lasting impacts, red flags, how to identify incidents, and industry resources.…
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or on your DMZ.…
Multi-factor authentication (MFA) is talked about, and used, a lot in our day-to-day lives. A classic example of using MFA is a debit card. Not only do you need the physical card, but you also have to enter a personal identification number (PIN) to use it when checking out at a store, or when taking money out of the ATM.…
From the first cyberattack death and causes of data breaches to the future of health data privacy and relationships with cyber resilient vendors, read the most pressing healthcare news in this post.…
Reflections from the UK Digital Health Summer School 2020
The recent Digital Health Summer School was different this year – and not just in the obvious way. As dictated by current COVID-19 restrictions, it was an online, digital event. This worked very well in terms of the quality and quantity of information that was able to be shared with delegates, but the traditional networking opportunities were missing.…
Get digital identity right with the Imprivata Digital Identity Framework for Healthcare
By Wes Wright and Randy Nale, Healthcare Technology Strategist at Microsoft
|
As healthcare delivery organizations (HDOs) evolve into highly complex environments including many roles, locations, devices, and applications, we’re challenged to manage these complexities while maintaining security and efficiency, all without adding a lot of disparate tools.…
Discover 11 Salesforce data security threats organizations discovered with real findings from Imprivata FairWarning's Salesforce data risk assessments.…
From the first cyberattack death and causes of data breaches to the future of health data privacy and relationships with cyber resilient vendors, read the most pressing healthcare news in this post.…
Network security audits: 5 keys for successful audits
A network security audit is essential to ensure sensitive data is protected from hackers and unauthorized third parties. It can isolate security threats and prevent data breaches, allowing you to plug holes, restrict network access, and improve your company’s network surveillance. Here we outline the 5 keys to preparing for a successful audit.…