Blog Listing

Get digital identity right with the Imprivata Digital Identity Framework for Healthcare
Get digital identity right with the Imprivata Digital Identity Framework for Healthcare
As healthcare delivery organizations (HDOs) evolve into highly complex environments including many roles, locations, devices, and applications, we’re challenged to manage these complexities while maintaining security and efficiency, all without adding a lot of disparate tools.
11 Salesforce Data Security Threats Uncovered by Risk Assessments
Discover 11 Salesforce data security threats organizations discovered with real findings from Imprivata FairWarning's Salesforce data risk assessments.
Healthcare Roundup: Pandemic-Fueled Drug Diversion, Walgreens’ Pharmacy Data Breach, and More
From the first cyberattack death and causes of data breaches to the future of health data privacy and relationships with cyber resilient vendors, read the most pressing healthcare news in this post.
Network security audits: 5 keys for successful audits
Network security audits: 5 keys for successful audits
A network security audit is essential to ensure sensitive data is protected from hackers and unauthorized third parties. It can isolate security threats and prevent data breaches, allowing you to plug holes, restrict network access, and improve your company’s network surveillance. Here we outline the 5 keys to preparing for a successful audit.
Exploring the value of time in clinical settings today
Exploring the value of time in clinical settings today
Clinicians are focused on delivering quality patient care. This has become especially true with the surge in patients due to the COVID-19 global pandemic.
Cloud Security Roundup: New Guidelines for Zero Trust Architecture, the Cost of Cybercrime, and More
Discover the latest cloud security news, including new zero trust architecture guidelines, CISO priorities, the cost of cybercrime, and more.
A Closer Look at How the COVID-19 Pandemic Affects Drug Diversion in Healthcare Organizations
COVID-19 has significantly impacted healthcare. In this article, discover how COVID-19 impacts drug diversion in healthcare organizations.
The importance of choice: How to deploy your vendor access management software
The importance of choice: How to deploy your vendor access management software
Not all software deployments are created equally! When it comes to purchasing and deploying new software, we know that not every organization will have the same wants or needs. Companies will differ with their infrastructure, resources, bandwidth, regulatory environments, or implementation timeframes.
Can you afford a third-party data breach?
Can you afford a third-party data breach?
In a year filled with data breaches, cyber-attacks, and unauthorized access, yet another company has been the victim of hackers targeting payment information. Have you considered the consequences of becoming susceptible to a hacking attack? Read this blog post to learn more.
What does zero trust network access look like for third-party vendors?
What does zero trust network access look like for third-party vendors?
Zero Trust Network Access (ZTNA) is everyone's favorite buzzword these days, particularly with security vendors hawking their products. It has become a popular catchphrase describing a next-generation security practice that was formalized by Gartner and implemented by Google in their BeyondCorp concept years later.
COVID-19 Privacy Laws and Regulating Contact Tracing in the U.S.
Policymakers in the United States have introduced three privacy acts to regulate contact tracing solutions that track the spread of the coronavirus, fueling the nationwide debate over data privacy...
Leading Academic Study Shows the Value of Imprivata OneSign to Hospitalists
Leading Academic Study Shows the Value of Imprivata OneSign to Hospitalists
A recent study released in the Journal of Hospital Administration (JHA) – titled “Easing hospitalist electronic health
Monthly Cloud Security Roundup: The Impact of the Cybersecurity Skills Gap, The Most Expensive Cause of Data Breaches, and More
Discover the latest cloud security news with July’s roundup, including the impact of the cybersecurity skills gap and more.
Monthly Healthcare News Roundup: The State of Healthcare Data Breaches in 2020, Telehealth Expansions, and More
From the cost of a health sector data breach to telehealth expansions, read the most pressing healthcare news from the last month.
Is cyber insurance worth it?
Is cyber insurance worth it?
These days, having cyber insurance that covers a company for costs related to cyberattacks is an expected standard corporate practice. It is the last in the line of risk mitigation tools that lessens or defers your company’s cyber risk.
The CISO is dead; Long live the CISO
The CISO is dead; Long live the CISO
More and more companies are hiring Chief Information Security Officers (CISOs) to navigate the rough waters of cybersecurity. The need for CISOs in enterprise organizations is at the height of importance with the increase in both ransomware attacks and data breaches.
Manage your vendors efficiently: Top features for remote access software
Manage your vendors efficiently: Top features for remote access software
Providing remote access for your third-party vendors is an essential part of doing business. Whether it’s Amazon’s AWS, Google’s G-Suite, or a custom platform, most enterprises have migrated their back-office, e-commerce, and other operations to cloud applications and remote services infrastructure.
The case for more Mobile in Healthcare
The case for more Mobile in Healthcare
During the last four months we’ve seen some dramatic changes in the UK healthcare landscape, particularly as the entire nation adapts to more mobile and home working. Now, everyone that can work from home, is doing so. This rapid uptake in the use of technology necessitated by the move to home working has advanced some trusts by several years.
What is vendor privileged access management (VPAM)?
What is vendor privileged access management (VPAM)?
If you’re in the cybersecurity world, you’ve probably come across the acronym PAM, or Privileged Access Management. This technology adds additional access controls and processes to coveted privileged credentials in order to prevent them from being compromised, while also limiting the damage if they ever are compromised.
Monthly Cloud Security Roundup: Hybrid Cloud Security Challenges, Vermont’s Updated Data Breach Law, Zoom’s New CISO, And More
Discover the latest cloud security news, including hybrid cloud security challenges, Vermont’s updated data breach law, Zoom’s new CISO, and more.