Blog Listing

Teaser Feature Image
Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts
Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...
How much does remote access cost? 5 factors to consider when pricing a remote access provider
Determining how much remote access will cost an enterprise is not a simple cut and dry calculation. The reason: different remote access providers may provide a variety of options or deployment models which provide different levels of value to their client companies.
Balancing security and usability in a connected mobile ecosystem
With the Internet of medical things (IoMT) and caregiver mobility on the rise, connected devices and device security is top of mind with today’s IT and security professionals.
How to avoid a third-party breach in 5 simple steps
If a burglar has the key to your house, having a state-of-the-art lock won't keep them out. That's exactly what happens when you allow third parties onto your network with privileged credentials without a solution that provides proper identity, access, and audit controls.
Teaser Feature Image
Monthly Healthcare News Roundup: Class Action Lawsuit Against Google, Denial of Drug Diversion at Practitioners’ Own Facilities, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about a class action lawsuit against Google, how healthcare executives...
Teaser Feature Image
Monthly Cloud Security Roundup: NASA Security Hack, Chaos in Silicon Valley, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss a NASA security hack, Maine’s internet...
Teaser Feature Image
New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions
The Wall Street Journal recently reported that a newly-founded crime-fighting cyber unit will begin enforcing security rules laid forth by New York cybersecurity regulations. The primary role of...
Teaser Feature Image
3 Ways Stony Brook Medicine Transformed its Privacy Program Using AI in Healthcare
Stony Brook underwent a transformation using AI that enabled their healthcare organization to reduce security expenses and time wasted trying to uncover bad user activities. Find out how in this post.
How to design and implement a vendor management process
Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process.
Teaser Feature Image
Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release
Eagerly anticipated by Salesforce users every season, the newest product release for 2019 brings exciting updates for Salesforce’s Event Monitoring tool. Primarily used to gain visibility in...
Six essentials of company data security
The list of companies that have had their data security breached seems endless: Target, Facebook, T-Mobile, Marriott, Quest Laboratories, Quora, Equifax and on and on and on. It’s no wonder that a recent study by Cisco showed that 31% of organizations have, at some point, encountered breaches of their data security infrastructure.
Teaser Feature Image
The NIST CSF Framework – What Does it Mean for Healthcare?
NIST, the National Institute of Standards and Technology, is a non-regulatory federal agency of the U.S. Commerce Department. Established in 1901, NIST was designed to promote innovation and...
Automating the provisioning process enhances efficiency, accuracy and standardization at Memorial Health System
Can a hospital that manages nearly 20,000 accounts with a small system access team - consisting of one manager, two system admins, and four system analysts -
Teaser Feature Image
Insider Threat Awareness: Do You Recognize These 5 Familiar Faces?
Would you recognize these 5 familiar faces of the insider threat? You might be surprised. Test your insider threat awareness with this post!
Teaser Feature Image
Top 5 Challenges Academic Medical Centers (AMC) Face
Academic medical centers (AMC) maintain reputations for excellence in research, innovation, and specialized care. But the way AMCs bring practitioners, medical staff, students, and researchers...
The essentials of enterprise vendor risk management
Today, it’s common for enterprises to outsource their non-core functions to vendors. It makes good business sense to focus company resources on your business and let other companies handle the standard IT infrastructure, but only if the associated risks are identified and managed.
Teaser Feature Image
Healthcare Privacy News Roundup: The Transformative Effects of AI in Healthcare, the Most Common HIPAA Violations, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about AI in Healthcare, HIPAA violations you should be aware of, opioid...
CHIME Opioid Task Force Playbook released, underscores importance of EPCS in fighting the opioid epidemic
As a member of the CHIME Opioid Task Force, Imprivata proudly welcomed the recent publication
Teaser Feature Image
Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More
Each month, we’ll bring you a few of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the debut of Salesforce Blockchain, zero...
How to find the right identity and access management tools
Major data breaches are a destructive reality– and the problem is growing. According to a Ponemon Institute study, 59% of companies said that they have experienced a data breach caused by one of their vendors or third-parties.