Blog Listing

Leveraging technology to simplify clinical workflow
What role does technology play in a provider’s ability to deliver the best patient care? A large one.
Teaser Feature Image
Facing the Opioid Crisis by Identifying Signs of Drug Diversion
How can identifying signs of drug diversion help fight the opioid crisis? Find out more in this article that explores ways to combat the epidemic.
Teaser Feature Image
6 Independent Third-Party Sources for Vetting Cloud Security Vendors
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.
What's the most vulnerable part of your network?
Researchers at DEF CON demonstrate the most “vulnerable part of your network” could be your SSL VPN. Last Friday at the annual DEF CON and Blackhat security conferences, Taiwanese security researchers Orange Tsai and Meh Chang revealed two new flaws in major vendor’s SSL VPN products.
3 considerations for multifactor authentication in healthcare
Not only is multifactor authentication a critical tool for healthcare organizations lookin
Teaser Feature Image
Monthly Healthcare News Roundup: GDPR Compliance Fines for a Netherlands Hospital, Healthcare’s Number One Financial Issue, and More
In this edition of our healthcare news roundup, learn about GDPR Compliance fines for a Netherlands hospital, healthcare’s number one financial issue, and more.
Vulnerable vendors make you vulnerable
Managing third-party vendors is a fact of life for many organizations, and one factor that is important to consider (yet often overlooked) is whether one or more of your vendors may be vulnerable to outside intrusion in any way.
4 steps to prevent third-party data breaches 
As the lessons learned from the LabCorp and Quest Diagnostic's patient data hacks fade from our collective memory, we must remember that attacks on corporate health systems and government networks are occurring with greater frequency and impact.
Teaser Feature Image
Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the Capital One data breach, British...
Teaser Feature Image
Cloud Security Tools: Selecting the Right Solutions and the Right Vendors
In this post, we highlight the five most effective cloud security vendor solutions that thwart the type of malicious activity that threatens the safety of your data.
What to know when pricing VPNs and remote access software
Deciding which remote access solution to use is not a simple or quick decision for most people, and it doesn't matter if you work in a large enterprise, a midsized organization, a small business, or on a solo project.
How do I manage my vendors efficiently?
Businesses increasingly rely on vendors to make their operations run smoothly and efficiently. And because of this, many companies have migrated essential business operations to a cloud-based infrastructure. Although this outsourcing makes good business sense since it can save money, dependence on vendors also comes with security risks and operational challenges.
How two solutions combine to combat patient misidentification
Patient misidentification has long plagued the healthcare system. Currently, up to 10% of individuals get identified incorrectly when they present for care, posing serious consequences for patients and care providers alike. In today’s consumer-focused world, patients are becoming more aware of the risks of misidentification and the importance of having secure and complete medical records.
Teaser Feature Image
The California Consumer Privacy Act is Coming – Does Your Organization Meet CCPA Compliance?
California’s Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. While that may seem far away, organizations only have a matter of months to align with the legislation to avoid...
Teaser Feature Image
Best Practices for Avoiding False Positives for Healthcare Data Security
False positives plague privacy and security professionals everywhere. But what impact do false positives have on healthcare security and how can they be avoided? Find out more here.
Remote access solutions: Which is the most secure?
Many organizations face the need to give one or more third-party vendors, as well as employees, remote access to their internal resources. When addressing the need to provide internal (employee) and external (third-party vendor) remote access, an enterprise should compare the primary tools and approaches available for remote support and consider their pros and cons - especially related to maintaining the security of their network.
How much do privileged access management (PAM) solutions cost?
Privileged Access Management or PAM solutions are a relatively new breed of tools that allow you to manage credentials with advanced permissions. It’s vital to properly monitor and secure these accounts because they grant access to critical network systems and applications.
Teaser Feature Image
Uncovering the Value of Salesforce Event Monitoring Logs
Have you ever wanted to know what your Salesforce users are clicking on? Have you ever needed to know what files your employees are downloading? Normally, uncovering this information is...
IAM for healthcare: What health IT security leaders should expect
Ten years ago, most health system IT leaders did not have Identity and Access Management (IAM) at the to
Teaser Feature Image
Top 3 Healthcare IT Challenges Children’s Hospitals Face
Children’s hospitals are renowned for the expert care they provide. But because of the specialized nature of their services and the vulnerability of their patients, they face unique healthcare IT...