Blog Listing

Multi-factor authentication is an underutilized tool in protecting against privileged credentials breaches
While it’s no surprise that nearly every major data breach of the last few years has involved the use of privileged credentials, it is surprising that one of the most effective security measures remains underutilized.
Teaser Feature Image
Monthly Healthcare News Roundup: The Future of Healthcare Technology, Data Breaches Tied to Fatal Heart Attacks, and More
From the human cost of data breaches to the future of healthcare technology, read last month’s top healthcare news.
Three tips to Jumpstart your Distressed IGA Deployment
A focus of the Gartner Identity & Access Management Summit this week is identity governance and administration (IGA) as a foundational component to a successful identity and access management (IAM) initiative.
Teaser Feature Image
Monthly Cloud Security Roundup: The 2019 Dreamforce Conference, Microsoft’s Response to CCPA, a Potential US Federal Privacy Law, and More
Discover the latest in cloud security news with November’s roundup, including the 2019 Dreamforce conference, Microsoft’s response to CCPA, and more.
An epidemic of ransomware washes over healthcare
Normally, the only types of epidemics that healthcare organizations fight are the microbial kind. But lately, they have been hit with a rash of ransomware attacks, crippling their IT systems and demanding payments to unlock the encrypted system.
The hidden cost of a data breach caused by third parties
As data breaches within private organizations and government entities continue to rise, the expenses to recover from them are escalating at an exponential pace. With third-party breaches, there can be additional costs beyond the usual financial, regulatory, and reputational damage that an internally caused data breach can bring.
Teaser Feature Image
5 Things to Know About Data Privacy Compliance for CCPA and Beyond
There’s much to know about CCPA, but these five key takeaways regarding data privacy compliance will help ease your preparations for the new regulation.
Teaser Feature Image
3 Ways Patient Privacy Monitoring Impacts Lives and Reduces the Cost of Data Breaches in the Healthcare Industry
Data breaches in the healthcare industry cost 2,100 lives and $4 billion annually. Read these 3 ways to protect both patient privacy and safety.
HIPAA compliance: What healthcare administrators need to know
According to a report from Duo Security, 56% of healthcare companies across the U.S. are still operating on legacy operating systems and software. In case you’re not familiar with the term, legacy is just another word for outdated. In the world of cybersecurity, outdated usually means vulnerable to a cyberattack.
Configuring Windows Server NLB for multi-node deployment
 
Teaser Feature Image
Privileged User Monitoring: 3 Ways to Prevent Privileged User Abuse in Healthcare
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...
The challenge of multifactor authentication and shared accounts
Recently, I wrote about the importance of combining multifactor authentication (MFA) and privileged access management.
Teaser Feature Image
Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More
Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.
Teaser Feature Image
Monthly Healthcare News Roundup: Class Action Lawsuit Against Opioid Manufacturers, the FDA’s New Draft Recommendations for CDS, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about a historic class action lawsuit against opioid manufacturers, the FDA’s...
Setting up a vendor management program
Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations.
Considerations for healthcare during National Cybersecurity Awareness Month
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Teaser Feature Image
Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?
Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.
Teaser Feature Image
So You’ve Had a HIPAA Breach… Now What?
You’ve overseen your healthcare organization’s privacy program. You’ve monitored HIPAA compliance. You’ve established security controls to protect patient data. But a HIPAA breach still happened....
PAM vs. VPAM…What’s the difference?
Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on accounts with privileged or administrative rights.
Teaser Feature Image
Patient Privacy and Home Care: How to Satisfy HIPAA Compliance Requirements On The Go
Patients are increasingly being cared for outside of hospitals – about 10,000 people turn 65  every day and many of them will need home-based healthcare. As a low-cost and outcome-based solution,...