Blog Listing

How Every Healthcare CISO Can Gain Time Back in their Day
Healthcare systems continue to face increasing challenges to secure patient data. From a 1988.6% increase in malware attacks since 2015 to data theft fueling the opioid crisis, the challenge for...
Hospital Drug Diversion Prevention: Healthcare Workers Aren’t Immune to the Opioid Epidemic
With the opioid crisis and drug theft coming together, hospital drug diversion prevention is necessary to protect patients and organizations.
Hidden Risk for CIOs: A Guide to Managing Shadow IT Security
Shadow IT is rampant in many organizations, representing as much as 50 percent of a company's technology spending, on average. And it can have a number of consequences for a business. First and...
HHS OCR: How Care Providers Can Avoid Falling Victim to ‘Cyber Extortion’
This week, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published a January newsletter with a focus on cyber extortion. The healthcare industry is in the...
Healthcare Providers Reveal No. 1 Patient Privacy Monitoring Solution
As the cybersecurity landscape continues to evolve, care providers are faced with a need for tools to defend against hackers, attackers, and insider threats. There are a plethora of vendors to...
Healthcare Data Security Breaches: Singapore’s Historically Large Data Breach Committed by Highly Sophisticated Cyber-Criminals
This week, Singapore announced a data breach at its largest healthcare provider, SingHealth; among its victims were Prime Minister Lee Hsien Loong. This instance is just one example of many...
GDPR and HIPAA: What are the Differences and How Can I Work Towards Compliance?
Healthcare organizations are no strangers to protecting sensitive data under HIPAA requirements. But what do privacy regulations like GDPR mean for compliance?
FINRA Cybersecurity: Where Should Financial Services Firms Focus on Cloud Compliance?
Are you responsible for complying with FINRA? As a financial services firm, this post contains the key areas you should focus on to simplify compliance and protect sensitive data.
Financial Services Utilize User Activity Monitoring for Data Theft Prevention
Is your financial services company utilizing user activity monitoring to prevent data theft? Read on to learn more about why data theft is prevalent among financial orgs and how to prevent it.
FDA Approves Drug 10 Times Stronger than Fentanyl: What It Means for Drug Diversion Prevention
With the newest FDA approved drug being 10x stronger than Fentanyl, this could cause cases of drug diversion. Find out how to prevent prescription pilfering in this post.
Imprivata FairWarning for Cloud Solutions for Salesforce, Expanding Trust in the Cloud
Discover how you can expand trust in cloud environments like Salesforce using continuous user activity monitoring and layered application security.
Ethical Use of Machine Learning Essential to Health of Globe
We’ve entered an age where machine learning and artificial intelligence technologies are poised to change life as we know it. Find out why ethics are so critical with the rise in machine learning.
ePHI Security: Why Monitor More Than Your EHR
How effectively does your healthcare organization ensure ePHI security and protection? Find out why monitoring just your EHR may not be enough.
Drug Diversion in Hospitals Leads to Largest National Healthcare Fraud Takedown in History
What did the largest national healthcare fraud takedown in history find? Drug diversion. Explore the epidemic and how we can solve it in this post.
Delivering More Value, Faster to Our Customers in the Imprivata FairWarning Promise Release
Find out what Imprivata FairWarning's Net Promoter Score means for the value we deliver to customers on a regular basis.
Data Visualization in Patient Privacy Monitoring…Powerful New Tools for Formidable New Threats
Find out how to detect advanced threats and coordinate security responses to facilitate patient data security and privacy and an effective, simple way.
Cloud Data Compliance and Security – Achieving Regulatory Compliance with Cloud Security Applications
Security and privacy may lead the pack when it comes to cloud usage, but cloud data compliance is an important area that often goes overlooked.
Creating a HIPAA Compliant Data Privacy and Security Training Program
Explore this post to learn the best practices for creating a HIPAA compliant data privacy and security training program.
Cloud Migration Best Practices: Lessons Learned From One Investment Firm’s Transition
When transitioning to the cloud, Starwood Capital Group had a lot to consider. Find out how they migrated successfully to the cloud to establish airtight Salesforce security.
Cloud Leaders Reveal Their Top Cloud Security Priorities, Compliance Focus
According to Intel Security, 49% of cloud security professionals have slowed cloud adoption due to a lack of cybersecurity skills. So how can we speed up cloud adoption to secure data?